In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
In this paper, we propose a novel technique on mining relationships in a sequential circuit to discover global constraints. In contrast to the traditional learning methods, our mi...
This paper proposes an improvement to the TCP ramp up behavior in slow-start. Current implementations of the TCP start-up procedure may result in an exponential growth of the cong...
Finding faces in visually challenging environments is crucial to many applications, such as audio-visual automatic speech recognition, video indexing, person recognition, and vide...
Most existing Peer-to-peer (P2P) systems support only title-based searches, which can not satisfy the content searches. In this paper, we proposed a semantic correlativity model wh...