— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
Conventional high-level synthesis uses the worst case delay to relate all inputs to all outputs of an operation. This is a very conservative approximation of reality, especially i...
Abstract-We address issues related to efficiency, fairness, endto-end delay minimization and Quality-of-Service in order to enable a flexible access and dynamic mission operation c...
Hui Zeng, Michael H. Hadjitheodosiou, John S. Bara...
In both distributed counting and queuing, processors in a distributed system issue operations which are organized into a total order. In counting, each processor receives the rank...
— One of the benefits of web services is their ability to participate in a web services composition process. Therefore, an end-to-end QoS infrastructure should be established. W...