Search
Now showing items 51-60 of 101
A Consistency Management Layer for Inter-Domain Routing
(2006-01-27)
This paper proposes an isolation layer -- a shim -- betweeninter-domain routing and packet forwarding. The job of this layer isto coordinate between Autonomous Systems (AS's) on when and how tomodify the forwarding state ...
Wide-Area Egomotion Estimation from Known 3D Structure
(2006-01-09)
We describe an algorithm that takes as inputs a coarse3D model of an environment, and a video sequence acquiredwithin the environment, and produces as output an estimateof the camera s 6-DOF egomotion expressed in the ...
Nuggeteer: Automatic Nugget-Based Evaluation Using Descriptions and Judgements
(2006-01-09)
TREC Definition and Relationship questions are evaluated on thebasis of information nuggets that may be contained in systemresponses. Human evaluators provide informal descriptions of eachnugget, and judgements (assignments ...
Service Identification in TCP/IP: Well-Known versus Random Port Numbers
(2006-01-11)
The sixteen-bit well-known port number is often overlooked as a network identifier in Internet communications. Its purpose at the most fundamental level is only to demultiplex flows of traffic. Several unintended uses of ...
Ubiquitous Memory Introspection (Preliminary Manuscript)
(2006-09-25)
Modern memory systems play a critical role in the performance ofapplications, but a detailed understanding of the application behaviorin the memory system is not trivial to attain. It requires timeconsuming simulations of ...
Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version)
(2006-09-11)
A trusted monotonic counter is a valuable primitive thatenables a wide variety of highly scalable offlineand decentralized applications that would otherwise be prone to replay attacks, including offline payment, e-wallets, ...
Programming a Sensor Network as an Amorphous Medium
(2006-06)
In many sensor network applications, the network is deployedto approximate a physical space. The network itself is not ofinterest: rather, we are interested in measuring the propertiesof the space it fills, and of establishing ...
Optimal Rates for Regularization Operators in Learning Theory
(2006-09-10)
We develop some new error bounds for learning algorithms induced by regularization methods in the regression setting. The "hardness" of the problem is characterized in terms of the parameters r and s, the first related ...
Combined static and dynamic mutability analysis
(2006-09-17)
Knowing which method parameters may be mutated during a method'sexecution is useful for many software engineering tasks. We presentan approach to discovering parameter immutability, in which severallightweight, scalable ...
Refactoring for parameterizing Java classes
(2006-09-05)
Type safety and expressiveness of many existing Java libraries and theirclient applications would improve, if the libraries were upgraded to definegeneric classes. Efficient and accurate tools exist to assist clientapplications ...