Search
Now showing items 231-240 of 648
NIRA: A New Internet Routing Architecture
(2004-10-14)
The present Internet routing system faces two challengingproblems. First, unlike in the telephone system, Internet users cannotchoose their wide-area Internet service providers (ISPs) separatelyfrom their local access ...
EpiChord: Parallelizing the Chord Lookup Algorithm with Reactive Routing State Management
(2004-08-13)
EpiChord is a DHT lookup algorithm that demonstrates that we canremove the O(log n)-state-per-node restriction on existing DHTtopologies to achieve significantly better lookup performance andresilience using a novel reactive ...
Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds
(2004-10-22)
Recent denial of service attacks are mounted by professionalsusing Botnets of tens of thousands of compromisedmachines. To circumvent detection, attackers areincreasingly moving away from pure bandwidth oods toattacks ...
Early Sketch Processing with Application in HMM Based Sketch Recognition
(2004-07-28)
Freehand sketching is a natural and crucial part of everyday humaninteraction, yet is almost totally unsupported by current user interfaces. With the increasing availability of tablet notebooks and pen based PDAs, sketchbased ...
Managing the 802.11 Energy/Performance Tradeoff with Machine Learning
(2004-10-27)
This paper addresses the problem of managing the tradeoff betweenenergy consumption and performance in wireless devices implementingthe IEEE 802.11 standard. To save energy, the 802.11 specificationproposes a power-saving ...
On Spatial Conjunction as Second-Order Logic
(2004-10-25)
Spatial conjunction is a powerful construct for reasoning about dynamically allocateddata structures, as well as concurrent, distributed and mobile computation. Whileresearchers have identified many uses of spatial ...
Combining dynamic abstractions in large MDPs
(2004-10-21)
One of the reasons that it is difficult to plan and act in real-worlddomains is that they are very large. Existing research generallydeals with the large domain size using a static representation andexploiting a single ...
Byzantine Fault Tolerance in Long-Lived Systems
(2004-08-13)
This paper proposes counter-measures that can be deployedas part of a replicated system to reduce the size ofW, and thus reduce the class of attacks to which the system is vulnerable. Obviously it will not be possible to ...
Ultra-fast Object Recognition from Few Spikes
(2005-07-06)
Understanding the complex brain computations leading to object recognition requires quantitatively characterizing the information represented in inferior temporal cortex (IT), the highest stage of the primate visual stream. ...
On Algorithms and Complexity for Sets with Cardinality Constraints
(2005-08-03)
Typestate systems ensure many desirable properties of imperativeprograms, including initialization of object fields and correct use ofstateful library interfaces. Abstract sets with cardinalityconstraints naturally ...