Zobrazeno 1 - 10
of 101
pro vyhledávání: '"Caesar, Matthew"'
Autor:
Chou, Kuan-Yen, Prabhu, Santhosh, Subramanian, Giri, Zhou, Wenxuan, Nayyar, Aanand, Godfrey, Brighten, Caesar, Matthew
Data plane verification has grown into a powerful tool to ensure network correctness. However, existing methods with monolithic models have memory requirements tied to network sizes, and the existing method of scaling out is too limited in expressive
Externí odkaz:
http://arxiv.org/abs/2405.20982
Autor:
Shirke, Aniket, Saifuddin, Aziz, Luthra, Achleshwar, Li, Jiangong, Williams, Tawni, Hu, Xiaodan, Kotnana, Aneesh, Kocabalkanli, Okan, Ahuja, Narendra, Green-Miller, Angela, Condotta, Isabella, Dilger, Ryan N., Caesar, Matthew
Increasing demand for meat products combined with farm labor shortages has resulted in a need to develop new real-time solutions to monitor animals effectively. Significant progress has been made in continuously locating individual pigs using trackin
Externí odkaz:
http://arxiv.org/abs/2111.10971
Autor:
Shirke, Aniket, Golden, Rebecca, Gautam, Mrinal, Green-Miller, Angela, Caesar, Matthew, Dilger, Ryan N.
Behavioral scoring of research data is crucial for extracting domain-specific metrics but is bottlenecked on the ability to analyze enormous volumes of information using human labor. Deep learning is widely viewed as a key advancement to relieve this
Externí odkaz:
http://arxiv.org/abs/2106.12181
Network configuration verification enables operators to ensure that the network will behave as intended, prior to deployment of their configurations. Although techniques ranging from graph algorithms to SMT solvers have been proposed, scalable config
Externí odkaz:
http://arxiv.org/abs/1911.02128
Modern smartphones contain motion sensors, such as accelerometers and gyroscopes. These sensors have many useful applications; however, they can also be used to uniquely identify a phone by measuring anomalies in the signals, which are a result from
Externí odkaz:
http://arxiv.org/abs/1503.01874
The Tor anonymity network has been shown vulnerable to traffic analysis attacks by autonomous systems and Internet exchanges, which can observe different overlay hops belonging to the same circuit. We aim to determine whether network path prediction
Externí odkaz:
http://arxiv.org/abs/1410.1823
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
The widespread use of smart devices gives rise to both security and privacy concerns. Fingerprinting smart devices can assist in authenticating physical devices, but it can also jeopardize privacy by allowing remote identification without user awaren
Externí odkaz:
http://arxiv.org/abs/1403.3366
Autor:
Piramuthu, Otto B.1 (AUTHOR) obp2@illinois.edu, Caesar, Matthew1 (AUTHOR)
Publikováno v:
Journal of Supercomputing. Feb2023, Vol. 79 Issue 2, p2153-2179. 27p.
Computing shortest paths is a fundamental primitive for several social network applications including socially-sensitive ranking, location-aware search, social auctions and social network privacy. Since these applications compute paths in response to
Externí odkaz:
http://arxiv.org/abs/1309.0874