The new MPEG-4 standard, scheduled to become an International Standard in February 1999, will include support not only for natural video and audio, but also for synthetic graphics...
Marc Escher, Igor S. Pandzic, Nadia Magnenat-Thalm...
Compiler optimizations are often driven by specific assumptions about the underlying architecture and implementation of the target machine. For example, when targeting shared-mem...
Jack L. Lo, Susan J. Eggers, Henry M. Levy, Sujay ...
In this paper, we study the fundamental limits of a wireless sensor network's lifetime under connectivity and k-coverage constraints. We consider a wireless sensor network wit...
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
Spam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fix...
Anirudh Ramachandran, Nick Feamster, Santosh Vempa...