Group communication protocols constitute a basic building block for highly dependable distributed applications. Designing and correctly implementing a group communication system (...
Claudio Basile, Long Wang, Zbigniew Kalbarczyk, Ra...
By source-level IP packet burst, we mean several IP packets sent back-to-back from the source of a flow. We first identify several causes of source-level bursts, including TCP...
Face and iris identification have been employed in various biometric applications. Besides improving the verification performance, the fusion of both of the biometrics has several ...
This paper presents a requirements engineering framework based on the notions of Actor, Goal, and Intentional Dependency, and applies it to a case study in the field of Informatio...
The association mining is one of the primary sub-areas in the field of data mining. This technique had been used in numerous practical applications, including consumer market baske...