Securing communication in network applications involves many complex tasks that can be daunting even for security experts. The Named Data Networking (NDN) architecture builds data...
Yingdi Yu, Alexander Afanasyev, David D. Clark, kc...
This full day tutorial on synchronization and security in Named Data Networking (NDN) will share important architectural concepts we are exploring in these areas, the software we ...
Hila Ben Abraham, Alexander Afanasyev, Yingdi Yu, ...
In implementing Information-Centric Networking (ICN), an efficient Name Resolution System (NRS) is required since names assigned directly to the named data objects (NDOs) are loca...
The Link State Content Routing (LSCR) protocol is presented, which supports routing over multiple paths to named content using link-state information. LSCR uses two types of link-...
Information Centric Networking (ICN) aims to evolve the Internet from a host-centric to a data-centric paradigm. In particular, it improves performance and resource efficiency in...
This paper explores how the control over the Near Field Communication (NFC) secure element could provide platform leadership in the mobile payment ecosystem. During a decade of tr...
Reputation systems aggregate the ratings provided by buyers to gauge the reliability of sellers in e-marketplaces. The evaluation accuracy of seller reputation significantly impa...
Because of their superior ability to preserve sequence information over time, Long Short-Term Memory (LSTM) networks, a type of recurrent neural network with a more complex comput...
Kai Sheng Tai, Richard Socher, Christopher D. Mann...
With massively parallel corpora of hundreds or thousands of translations of the same text, it is possible to automatically perform typological studies of language structure using ...
We present a simple yet effective unsupervised domain adaptation method that can be generally applied for different NLP tasks. Our method uses unlabeled target domain instances to...