—Open spectrum systems allow unlicensed secondary users equipped with cognitive radio to opportunistically access the spectrum underutilized by primary users. Cognitive radio has...
Algorithm portfolios aim to increase the robustness of our ability to solve problems efficiently. While recently proposed algorithm selection methods come ever closer to identifyin...
Serdar Kadioglu, Yuri Malitsky, Ashish Sabharwal, ...
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
We consider the problem of joining data streams using limited cache memory, with the goal of producing as many result tuples as possible from the cache. Many cache replacement heu...
Inspired by the underlying relationship between classification capability and the mutual information, in this paper, we first establish a quantitative model to describe the inform...