Internet topology mapping studies utilize large scale topology maps to analyze various characteristics of the Internet. IP alias resolution, the task of mapping IP addresses to th...
Abstract. Signature-based input filtering is an important and widely deployed defense. But current signature generation methods have limited coverage and the generated signatures ...
Juan Caballero, Zhenkai Liang, Pongsin Poosankam, ...
In this paper, we examine the feasibility of sending real-time CBR workloads over TCP. This is motivated by the friendliness of NATs and firewalls towards TCP as opposed to UDP a...
Salman Baset, Eli Brosh, Vishal Misra, Dan Rubenst...
Data Envelopment Analysis (DEA) is one of the most widely used methods in the measurement efficiency and productivity of Decision Making Units (DMUs). DEA for a large dataset with...
Abstract. This paper presents an experimental "morphological analysis" retrieval system for mammograms, using Relevance-Feedback techniques. The features adopted are firs...
Stylianos D. Tzikopoulos, Harris V. Georgiou, Mich...