Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and recognized by the industry. H...
In this paper, we take the sample-path approach in analyzing the asymptotic behavior of single-hop bandwidth estimation under bursty cross-traffic and show that these results are ...
measured together with upper-body and hand motion. This data would be used to create a truly “immersive”, tetherless musical environment, where any kind of body motion would be...
Joseph A. Paradiso, Craig Abler, Kai-yuh Hsiao, Ma...
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
We propose an explicit rate indication scheme for congestion avoidance in ATM networks. In this scheme, the network switches monitor their load on each link, determining a load fac...