Nowadays, object recognition is widely studied under the paradigm of matching local features. This work describes a genetic programming methodology that synthesizes mathematical e...
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
Research efforts focused on developing "active reports" are currently underway. Active reports are designed to foster communication among teachers, students, and parents ...
Diego Zapata-Rivera, Eric G. Hansen, Valerie J. Sh...
Virtual Private Networks provide secure and reliable communication between customer sites. With increase in number and size of VPNs, providers need efficient provisioning techniqu...
Satish Raghunath, K. K. Ramakrishnan, Shivkumar Ka...
Classical content sharing applications like BitTorrent are not designed to run over wireless networks. When adapting them to these constrained networks, two main problems arise. On...