— A practical method of locating congested segments on the Internet by periodic end-to-end packet delay measurements along multiple paths is presented. This method is a network t...
Atsuo Tachibana, Shigehiro Ano, Toru Hasegawa, Mas...
A protocol for a distributed hash table (DHT) incurs communication costs to keep up with churn—changes in membership—in order to maintain its ability to route lookups efficie...
Jinyang Li, Jeremy Stribling, Thomer M. Gil, Rober...
Monitoring user-system performance in interactive search is a challenging task. Traditional measures of retrieval evaluation, based on recall and precision, are not of any use in ...
Liudmila V. Boldareva, Arjen P. de Vries, Djoerd H...
Given a biometric feature-space, in this paper we present a method to predict cumulative match characteristic (CMC) curve performance for a large population of individuals using a ...
The strength of Micro Systems Technology (MST) is the ability to fabricate a large number of small devices economically. However such devices tend to have errors caused by the vari...