Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
Packaging software assets for reuse can improve the potential for others to adopt the software. Packaging the software with appropriate documentation and other resources can facil...
Ryan Gerard, Robert R. Downs, James J. Marshall, R...
Abstract— In this paper we present a case study of cooperation of a strongly heterogeneous robot team, composed of a highly articulated humanoid robot and a wheeled robot with la...
The increased complexity of performance-sensitive software systems leads to increased use of automated adaptation policies in lieu of manual performance tuning. Composition of ada...
Jin Heo, Dan Henriksson, Xue Liu, Tarek F. Abdelza...