— We consider a sensor network measuring correlated data, where the task is to gather all data from the network nodes to a sink. We consider the case where data at nodes is lossy...
Abstract— Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strat...
Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole ...
Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
Abstract. This research develops an optimal planning model for pump-treatinject based groundwater remediation systems. Optimizing the design of the pump-treat-inject system is a no...
Abstract. X-ray microCT (computed tomography) has become a valuable tool in the analysis of vascular architecture in small animals. Because of its high resolution, a detailed asses...
Marcel Jackowski, Xenophon Papademetris, Lawrence ...