There is an interesting class of ICNs, which includes the star graph and the n-way shuffle, for which the network diameter is sub-logarithmic in the network size. This paper prese...
Michael A. Palis, Sanguthevar Rajasekaran, David S...
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
The SenseCam is a passive capture wearable camera, worn around the neck and developed by Microsoft Research in the UK. When worn continuously it takes an average of 2,000 images p...
Daragh Byrne, Aiden R. Doherty, Gareth J. F. Jones...
- Serial algorithms to evaluate the Gabor transform of a discrete signal are bound by the length of signal for which the transform can be evaluated. The time taken, if machine memo...
We have developed a mobile thin-client server named ”HTTP-FUSE-KNOPPIX-BOX” that incorporates mechanisms for increasing performance, distributing load, and providing fault tole...
Jun Kanai, Mitaro Namiki, Kuniyasu Suzaki, Toshiki...