This paper develops a new model that describes the queueing process of a communication network when data sources use window flow control. The model takes into account the burstines...
Ao Tang, Lachlan L. H. Andrew, Krister Jacobsson, ...
Methods for reconstructing photorealistic 3D graphics models from images or video are appealing applications of computer vision. Such methods rely on good input image data, but th...
The prevalence of P2P technology contributes the ease of file-sharing, but it also brings some problems such as free-riding and copyright infringement. To solve these problems, ma...
A logic model checker can be an effective tool for debugging software applications. A stumbling block can be that model checking tools expect the user to supply a formal statement...
Margaret H. Smith, Gerard J. Holzmann, Kousha Etes...
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...