Understanding the flow of information is an important aspect in computer security. There has been a recent move towards tracking information in hardware and understanding the flow...
Jason Oberg, Wei Hu, Ali Irturk, Mohit Tiwari, Tim...
Two schools of thoughts have emerged over the recent debate on internet router buffer sizing. One school argues that the presence of a large number of flows leads to traffic desync...
Abstract. We present a static analysis technique for modeling and approximating the long-run resource usage of programs. The approach is based on a quantitative semantic framework ...
David Cachera, Thomas P. Jensen, Arnaud Jobin, Pas...
Abstract. In this work, we propose a model-based approach for estimating the 3D position and orientation of a dummy's head for crash test video analysis. Instead of relying on...
Juergen Gall, Bodo Rosenhahn, Stefan Gehrig, Hans-...
Traditionally, quantitative image quality analytical methods rely on large hardware in fixed installations. There are many situations when portability is required, where these met...