Today's networking community is becoming increasingly skeptical of the significance of research results founded wholly upon experimental results conducted in simulation. Now, ...
Jeffrey Considine, John W. Byers, Ketan Meyer-Pate...
Advanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into reusable process modules. These process modu...
In most Internet applications, there is little control on how to protect the data content once it reaches the client. Implementing centralized control for data content delivered t...
We identify crucial design issues in building a distributed inverted index for a large collection of web pages. We introduce a novel pipelining technique for structuring the core ...
We study the application of Unequal Loss Protection (ULP) algorithms to motion-compensated video over lossy packet networks. In particular, we focus on streaming video applications...
Justin Goshi, Richard E. Ladner, Eve A. Riskin, Al...