Multi-agent systems have proven to be a powerful technology for building complex distributed applications. However, the process of designing, configuring and deploying agent-based...
Csongor Nyulas, Martin J. O'Connor, Samson W. Tu, ...
The security of your data and of your network is in the hands of intrusion detection systems, virus scanners and spam filters, which are all critically based on string matching. ...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
Q-ball imaging (QBI), introduced by D. Tuch, reconstructs the diffusion orientation distribution function (ODF) of the underlying fiber population of a biological tissue. An anal...
Maxime Descoteaux, Peter Savadjiev, Jennifer S. W....
The Internet is an extremely complex system, and it is essential that we be able to make accurate measurements in order to understand its underlying behavior or to detect improper...
Alden W. Jackson, Walter C. Milliken, Cesar A. San...
This paper addresses design exploration for protocols that are employed in systems with availability-consistency tradeoffs. Distributed data is modelled as states of objects repl...