Understanding the dynamics of bodies of water and their impact on the global environment requires sensing information over the full volume of water. We develop a gradientbased dec...
Carrick Detweiler, Marek Doniec, Mingshun Jiang, M...
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
This work describes a distributed framework for routing path optimization in Optical Burst-Switched (OBS) networks that loosely mimics the foraging behaviour of ants observed in na...
Multi-field packet classification is a key enabling function of a variety of network applications, such as firewall processing, Quality of Service differentiation, traffic billing...
This paper evaluates several techniques to save leakage in CMP L2 caches by selectively switching off the less used lines. We primarily focus on private snoopy L2 caches. In this c...
Matteo Monchiero, Ramon Canal, Antonio Gonzá...