Despite the large number of papers on network topology modeling and inference, there still exists ambiguity about the real nature of the Internet AS and router level topology. Whi...
Hamed Haddadi, Steve Uhlig, Andrew W. Moore, Richa...
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
The ability to automatically detect visually interesting regions in images has practical applications in the design of active machine vision systems. Analysis of the statistics of...
Umesh Rajashekar, Ian van der Linde, Alan C. Bovik...
An adequate understanding of climate variability and the eventual prediction of climate change are among the most urgent and far-reaching efforts of the scientific community.. Mea...
Ramprasad Balasubramanian, Vishal Sood, Bin John, ...
By embedding sensors in mobile devices, it is possible to exploit the ubiquitous presence of these devices to construct applications for large-scale sensing and monitoring of envi...