—This work combines two existing defenses against distributed denial-of-service (DDoS) attacks DefCOM and Speak-up resulting in a synergistic improvement. DefCOM defense organize...
Mohit Mehta, Kanika Thapar, George C. Oikonomou, J...
Abstract— Inferring AS-level end-to-end paths can be a valuable tool for both network operators and researchers. A widely known technique for inferring end-to-end paths is to per...
Architectural advances of modern systems has often been at odds with control complexity, requiring significant effort in both design and verification. This is particularly true ...
Instruction combining is an optimization to replace a sequence of instructions with a more efficient instruction yielding the same result in a fewer machine cycles. When we use it...
Conventional low frame rate cameras result in blur and/or aliasing in images while capturing fast dynamic events. Multiple low speed cameras have been used previously with stagger...
Amit Agrawal, Mohit Gupta, Ashok Veeraraghavan, Sr...