—To reserve or not for bursty video traffic over wireless access networks has been a long-debated issue. For uplink transmissions in infrastructure-based wireless networks and p...
Ruonan Zhang, Rukhsana Ruby, Jianping Pan, Lin Cai...
To fully tap into the potential of heterogeneous machines composed of multicore processors and multiple accelerators, simple offloading approaches in which the main trunk of the ap...
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
How do we find a natural clustering of a real world point set, which contains an unknown number of clusters with different shapes, and which may be contaminated by noise? Most clu...
In this paper, we propose a general framework for real time video data mining to be applied to the raw videos (traffic videos, surveillance videos, etc.). We investigate whether t...