—In recent years, the scale of clouds and networks has increased greatly. It is important to ensure that the management systems used in these environments can scale as well. A ce...
—Just like computation and storage, networks in data centers require virtualization in order to provide isolation between multiple co-existing tenants. Existing data center netwo...
James Kempf, Ying Zhang, Ramesh Mishra, Neda Behes...
With the popularity of big data and cloud computing, data parallel framework MapReduce based data warehouse systems are used widely. Column store is a default data placement in th...
During the design of class models for information systems, databases or programming, experts of the domain and designers discuss to identify and agree on the domain concepts. Forma...
This paper establishes a nearly optimal algorithm for estimating the frequencies and amplitudes of a mixture of sinusoids from noisy equispaced samples. We derive our algorithm by...
Gongguo Tang, Badri Narayan Bhaskar, Benjamin Rech...
Pattern recognition systems have been increasingly used in security applications, although it is known that carefully crafted attacks can compromise their security. We advocate tha...
This paper describes a 3D tour of exhibitions set up for the celebration of the 150 years of Italian unity. Through a specifically developed Web plugin, the users can navigate the...
The growing use of social media means that an increasing amount of people’s lives are visible online. We draw from Goffman’s theatrical metaphor and Hogan’s exhibition appro...
Xuan Zhao, Niloufar Salehi, Sasha Naranjit, Sara A...
Abstract. Several masking schemes to protect cryptographic implementations against side-channel attacks have been proposed. A few considered the glitches, and provided security pro...
Andersen’s pointer analysis becomes more precise when applied with full heap cloning but unscalable for large, heapintensive programs. In contrast, k-callsite-sensitive heap clo...