When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...
Due to attenuation and spatial smoothing that occurs in the conducting media, the bioelectric inverse problem of estimating sources from remote measurements is ill-posed and solut...
Yesim Serinagaoglu, Dana H. Brooks, Robert S. MacL...
The lognormal has been traditionally used to model the failure time distribution of electromigration failures. However, when used to estimate the failure of large metal layers, it...
— We describe an algorithm to estimate the future cell throughput of a multi-rate broadband wireless network based on previous measurements. The total throughput of a cell depend...
In many areas such as e-commerce, mission-critical N-tier applications have grown increasingly complex. They are characterized by non-stationary workloads (e.g., peak load several...