In this paper, we present a novel type and effect analysis for detecting memory errors in C source code. We extend the standard C type system with effect, region, and host annotat...
—We consider the problem of determining the “closest”, or best Internet host to connect to, from a list of candidate servers. Most existing approaches rely on the use of metr...
—This paper presents a large scale longitudinal study of the spatial and temporal features of malicious source addresses. The basis of our study is a 402-day trace of over 7 bill...
— To achieve accurate and efficient interaction with humans, robot training is indispensable to make robot cooperate with different host. We are focusing on development of a huma...
Tao Liu, H. Utsunomiya, Yoshio Inoue, Kyoko Shibat...
Recent theoretical and simulation-based studies have confirmed the tremendous benefit of peer-to-peer (P2P) communication at reducing the cost of running a VoD service. To date,...