Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
In this paper we present a JXTA-based platform, called Juxta-CAT, which is an effort to use the JXTA architecture to build a job execution-sharing distributed environment. The Ju...
The authors developed an extensible system for video exploitation that puts the user in control to better accommodate novel situations and source material. Visually dense displays...
Ming-yu Chen, Michael G. Christel, Alexander G. Ha...
Abstract— Wireless mesh networks are multihop networks of wireless routers typically used for wireless coverage over a large community. Applications include community-scale peer-...
Abstract. This paper describes the application of a decentralised coordination algorithm, called Collaborative Reinforcement Learning (CRL), to two different distributed system pr...
Jim Dowling, Raymond Cunningham, Anthony Harringto...