There are two primary challenges to supportinghigh-throughput, reliable multicast in wireless mesh networks (WMNs). The first is no different from unicast: wireless links are inhe...
Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun ...
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
The design of interactive software that populates an ambient space is a complex and ad-hoc process with traditional software development approaches. In an ambient space, important ...
Developing a learning design using IMS Learning Design (LD) is difficult for average practitioners because a high overhead of pedagogical knowledge and technical knowledge is requi...
Yongwu Miao, Tim Sodhi, Francis Brouns, Peter B. S...
As computer architectures become increasingly complex, hand-tuning compiler heuristics becomes increasingly tedious and time consuming for compiler developers. This paper presents...
Matthew E. Taylor, Katherine E. Coons, Behnam Roba...