—Recently, there has been significant research interest in leveraging social networks to defend against Sybil attacks. While much of this work may appear similar at first glanc...
Bimal Viswanath, Mainack Mondal, Allen Clement, Pe...
The advent of the smartphone as a highly complex technology has been accompanied by mobile operating systems (OS), large communities of developers, diverse content providers, and ...
This paper presents findings from two research projects that entail needs assessments, benchmarking, and onsite diagnostics of anchor institutions in support of multi-million doll...
Lauren H. Mandel, Nicole D. Alemanne, Charles R. M...
We propose an energy-aware video streaming system for portable computing devices, in which the video can be played back for the specified duration within the remaining battery am...
Morihiko Tamai, Tao Sun, Keiichi Yasumoto, Naoki S...
The expectation maximization (EM) algorithm is a popular algorithm for parameter estimation in models with hidden variables. However, the algorithm has several non-trivial limitat...