Abstract. We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe su...
When labeled examples are limited and difficult to obtain, transfer learning employs knowledge from a source domain to improve learning accuracy in the target domain. However, the...
ErHeng Zhong, Wei Fan, Jing Peng, Kun Zhang, Jiang...
— Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this pa...
Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal...
iMobile is a platform that addresses the research issues in building mobile services. iMobile acts as a message gateway that allows mobile devices using various protocols on diffe...
Herman Chung-Hwa Rao, Yih-Farn Chen, Di-Fa Chang, ...
With the growing adoption of virtualized datacenters and cloud hosting services, the allocation and sizing of resources such as CPU, memory, and I/O bandwidth for virtual machines...
Sajib Kundu, Raju Rangaswami, Ajay Gulati, Ming Zh...