OpenBU

Browsing CAS: Computer Science: Technical Reports by Title

OpenBU

Browsing CAS: Computer Science: Technical Reports by Title

Sort by: Order: Results:

  • Smaragdakis, Georgios; Lekakis, Vassilis; Laoutaris, Nikolaos; Bestavros, Azer; Byers, John W.; Roussopoulos, Mema (Boston University Computer Science Department, 2008-07-01)
    A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of connectivity management, i.e., folding new arrivals into an existing overlay, and rewiring to ...
  • Smaragdakis, Georgios; Laoutaris, Nikolaos; Bestavros, Azer; Byers, John W.; Roussopoulos, Mema (Boston University Computer Science Department, 2007)
    A foundational issue underlying many overlay network applications ranging from routing to P2P file sharing is that of connectivity management, i.e., folding new arrivals into an existing overlay, and re-wiring to cope with ...
  • Londono, Jorge (CS Department, Boston University, 2010-07-20)
    Large scale distributed computing infrastructures pose challenging resource management problems, which could be addressed by adopting one of two perspectives. On the one hand, the problem could be framed as a global ...
  • Liu, Jun; Matta, Ibrahim; Crovella, Mark (Boston University Computer Science Department, 2002-03-14)
    End-to-End differentiation between wireless and congestion loss can equip TCP control so it operates effectively in a hybrid wired/wireless environment. Our approach integrates two techniques: packet loss pairs (PLP) and ...
  • Riga, N.; Matta, I.; Medina, A.; Partridge, C.; Redi, J. (Boston University Computer Science Department, 2007)
    We present a transport protocol whose goal is to reduce power consumption without compromising delivery requirements of applications. To meet its goal of energy efficiency, our transport protocol (1) contains mechanisms ...
  • Sweha, Raymond; Bestavros, Azer; Matta, Ibrahim (Computer Science Department, Boston University, 2012-06-30)
    When it was first introduced a decade ago, Tor, the anonymous onion routing protocol, aimed at providing anonymity for latency-sensitive applications, such as web-browsing, as opposed to bandwidth-intensive applications, ...
  • Reyzin, Leonid (Boston University Computer Science Department, 2007-09-20)
    A secure sketch (defined by Dodis et al.) is an algorithm that on an input w produces an output s such that w can be reconstructed given its noisy version w' and s. Security is defined in terms of two parameters m and m˜ : ...
  • Tiuryn, Jerzy (Boston University Computer Science Department, 1995-02)
    Two polymorphic types σ and τ are said to be bicoercible if there is a coercion from σ to τ and conversely. We give a complete equational axiomatization of bicoercible types and prove that the relation of bicoercibility ...
  • Park, Kihong (Boston University Computer Science Department, 1996-07-22)
    One-and two-dimensional cellular automata which are known to be fault-tolerant are very complex. On the other hand, only very simple cellular automata have actually been proven to lack fault-tolerance, i.e., to be mixing. ...
  • Rosales, Rómer; Siddiqui, Matheen; Alon, Jonathan; Sclaroff, Stan (Boston University Computer Science Department, 2001-06)
    An approach for estimating 3D body pose from multiple, uncalibrated views is proposed. First, a mapping from image features to 2D body joint locations is computed using a statistical framework that yields a set of several ...
  • Athitsos, Vassilis; Sclaroff, Stan (Boston University Computer Science Department, 2003-04-01)
    A method is proposed that can generate a ranked list of plausible three-dimensional hand configurations that best match an input image. Hand pose estimation is formulated as an image database indexing problem, where the ...
  • Rosales, Romer; Sclaroff, Stan (Boston University Computer Science Department, 2000-06-10)
    A non-linear supervised learning architecture, the Specialized Mapping Architecture (SMA) and its application to articulated body pose reconstruction from single monocular images is described. The architecture is formed ...
  • Sigal, Leonid; Sclaroff, Stan; Athitsos, Vassilis (Boston University Computer Science Department, 1999-12-01)
    A novel approach for real-time skin segmentation in video sequences is described. The approach enables reliable skin segmentation despite wide variation in illumination during tracking. An explicit second order Markov model ...
  • Eriksson, Brian; Crovella, Mark (Computer Science Department, Boston University, 2011-05-12)
    The problem of estimating the intrinsic dimension of a set of points in high dimensional space is a critical issue for a wide range of disciplines, including genomics, finance, and networking. Current estimation techniques ...
  • Matta, Ibrahim; Bestavros, Azer (Boston University Computer Science Department, 1997-07-30)
    To support the diverse Quality of Service (QoS) requirements of real-time (e.g. audio/video) applications in integrated services networks, several routing algorithms that allow for the reservation of the needed bandwidth ...
  • Mullally, William; Sclaroff, Stan; Betke, Margrit (Boston University Computer Science Department, 2009-03-11)
    We propose a novel image registration framework which uses classifiers trained from examples of aligned images to achieve registration. Our approach is designed to register images of medical data where the physical condition ...
  • Liu, Likai; Kfoury, Assaf (Boston University Computer Science Department, 2008-01-24)
    In our previous work, we developed TRAFFIC(X), a specification language for modeling bi-directional network flows featuring a type system with constrained polymorphism. In this paper, we present two ways to customize the ...
  • Guirguis, Mina; Bestavros, Azer; Matta, Ibrahim (Boston University Computer Science Department, 2003-12-02)
    For a given TCP flow, exogenous losses are those occurring on links other than the flow's bottleneck link. Exogenous losses are typically viewed as introducing undesirable "noise" into TCP's feedback control loop, leading ...
  • Crovella, Mark E.; Bestavros, Azer (Boston University Computer Science Department, 1995-10-12)
    Recently the notion of self-similarity has been shown to apply to wide-area and local-area network traffic. In this paper we examine the mechanisms that give rise to self-similar network traffic. We present an explanation ...
  • Thangali, Ashwin; Nash, Joan; Sclaroff, Stan; Neidle, Carol (Computer Science Department, Boston University, 2011-05-15)
    Handshape is a key linguistic component of signs, and thus, handshape recognition is essential to algorithms for sign language recognition and retrieval. In this work, linguistic constraints on the relationship between ...

Search OpenBU


Browse

Deposit Materials

Statistics