This paper investigates “Quick UDP Internet Connections” (QUIC), which was proposed by Google in 2012 as a reliable protocol on top of UDP in order to reduce Web Page retrieva...
Probabilistic topic models, such as PLSA and LDA, are gaining popularity in many fields due to their high-quality results. Unfortunately, existing topic models suffer from two d...
Youngchul Cha, Keng-hao Chang, Hari Bommaganti, Ye...
One classical approach to ensuring memory safety of C programs is based on storing block metadata in a tree-like datastructure. However it becomes relatively slow when the number ...
Arvid Jakobsson, Nikolai Kosmatov, Julien Signoles
In this paper we demonstrate several examples of solving challenging algorithmic problems from the Google Code Jam programming contest with the Prolog-based ECLi PSe system using ...
An important dimension of complex networks is embedded in the weights of its edges. Incorporating this source of information on the analysis of a network can greatly enhance our u...
Sarvenaz Choobdar, Pedro Manuel Pinto Ribeiro, Fer...
The performance of value classes is highly dependent on how they are represented in the virtual machine. Value class instances are immutable, have no identity, and can only refer ...
Tobias Pape, Carl Friedrich Bolz, Robert Hirschfel...
Given the trend towards mobile computing, the next generation of ubiquitous “smart” services will have to continuously analyze surrounding sensor data. More than ever, such se...
Peer-to-peer (P2P) communication plays an ever-expanding role in critical applications with rapidly growing user bases. In addition to well-known P2P systems for data sharing (e.g...
Organizations often outsource software testing activities to optimize software testing and verify developed software by independent experts. Related benefits include expectations ...