In this paper, we present a series of distributed algorithms for coverage verification in sensor networks with no location information. We demonstrate how, in the absence of locali...
This paper describes how design information, in our case UML specifications, can be used to evolve a software system and validate the consistency of such an evolution. This work c...
Network traffic modeling generally views traffic as a superposition of flows that creates a timeseries of volume counts (e.g. of bytes or packets). What is omitted from this view ...
This study of the flow of online discussions examined how earlier messages affected later messages along five dimensions: (1) evaluations (agree, disagree, or unresponsive actions...
The last decade has seen an explosion in blogging and the blogosphere is continuing to grow, having a large global reach and many vibrant communities. Researchers have been pouring...