Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet’s interdomain-routing system. In this paper, we propose an inst...
Optimizing programs at run-time provides opportunities to apply aggressive optimizations to programs based on information that was not available at compile time. At run time, prog...
— In this paper, we propose a two-step controller design method with control Lyapunov functions (CLFs) for nonlinear systems with convex input constraints. In the first step, we...
Abstract—One of the challenges in a military wireless sensor network is the determination of an information collection infrastructure which minimizes battery power consumption. T...
The problem of eciently retrieving and ranking documents from a huge collection according to their relevance to a research topic is addressed. A broad class of queries is dened a...