We consider the design of bandwidth-demanding broadcasting applications using overlays in environments characterized by hosts with limited and asymmetric bandwidth, and significa...
Yu-Wei Eric Sung, Michael A. Bishop, Sanjay G. Rao
Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack again...
Jonathon T. Giffin, Mihai Christodorescu, Louis Kr...
Our previous research presents a methodology of cooperative problem solving for BDI systems, based on a complete formal theory. This covers both a static part, defining individua...
Marcin Dziubinski, Rineke Verbrugge, Barbara Dunin...
Localization is a fundamental operation in mobile and self-configuring networks such as sensor networks and mobile ad hoc networks. For example, sensor location is often critical...
Sameer Tilak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...
This paper presents the application of Exploratory Spatial Data Analysis (ESDA) and Kriging from GIS (ArcGIS8.3) in disease mapping through the analysis of hepatitis B in China. Th...