: Social networks, religion and culture of human beings play a major role in the day-to-day activities performed by each individual in group oriented missions. The aggregation and ...
Soumya Banerjee, Ajith Abraham, Sang-Yong Han, P. ...
This paper looks at the problem of multi-streaming in 3D teleimmersion and describes how a protocol architecture called CP (for Coordination Protocol) can be used to coordinate vi...
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
The recent investigation of privacy-preserving data mining and other kinds of privacy-preserving distributed computation has been motivated by the growing concern about the privacy...
Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqian...
User applications that move a lot of data across the user-kernel boundary suffer from a serious performance penalty. We provide a framework, Compound System Calls (CoSy), to enhan...
Amit Purohit, Charles P. Wright, Joseph Spadavecch...