OpenBU

Browsing CAS: Computer Science: Technical Reports by Title

OpenBU

Browsing CAS: Computer Science: Technical Reports by Title

Sort by: Order: Results:

  • Smaragdakis, Georgios; Laoutaris, Nikolaos; Bestavros, Azer; Byers, John; Roussopoulos, Mema (Boston University Computer Science Department, 2007)
    A foundational issue underlying many overlay network applications ranging from routing to P2P file sharing is that of connectivity management, i.e., folding new arrivals into the existing mesh and re-wiring to cope with ...
  • Erramilli, Vijay; Crovella, Mark; Taft, Nina (Boston University Computer Science Department, 2006-09-06)
    A common assumption made in traffic matrix (TM) modeling and estimation is independence of a packet's network ingress and egress. We argue that in real IP networks, this assumption should not and does not hold. The fact ...
  • Liu, Lifeng; Sclaroff, Stan (Boston University Computer Science Department, 2000-03-22)
    An improved method for deformable shape-based image indexing and retrieval is described. A pre-computed index tree is used to improve the speed of our previously reported on-line model fitting method; simple shape features ...
  • Potamias, Michalis (Boston University Computer Science Department, 2009)
    This thesis elaborates on the problem of preprocessing a large graph so that single-pair shortest-path queries can be answered quickly at runtime. Computing shortest paths is a well studied problem, but exact algorithms ...
  • Stefan, Alexandra (Boston University Computer Science Department, 2008)
    Many real world image analysis problems, such as face recognition and hand pose estimation, involve recognizing a large number of classes of objects or shapes. Large margin methods, such as AdaBoost and Support Vector ...
  • Bestavros, Azer; Byers, John; Harfoush, Khaled (Boston University Computer Science Department, 2001-05)
    The development and deployment of distributed network-aware applications and services over the Internet require the ability to compile and maintain a model of the underlying network resources with respect to (one or more) ...
  • Rosales, Romer; Sclaroff, Stan (Boston University Computer Science Department, 1999-12-01)
    A novel approach for estimating articulated body posture and motion from monocular video sequences is proposed. Human pose is defined as the instantaneous two dimensional configuration (i.e., the projection onto the image ...
  • Bakewell, Adam; Carlier, Sébastien; Kfoury, A. J.; Wells, J. B. (Boston University Computer Science Department, 2005-12-30)
    We present a procedure to infer a typing for an arbitrary λ-term M in an intersection-type system that translates into exactly the call-by-name (resp., call-by-value) evaluation of M. Our framework is the recently developed ...
  • Kfoury, A.J.; Stolboushkin, A.P. (Boston University Computer Science Department, 1996-08-15)
    We generalize the well-known pebble game to infinite dag's, and we use this generalization to give new and shorter proofs of results in different areas of computer science (as diverse as "logic of programs" and "formal ...
  • Morcos, Hany; Atia, George; Bestavros, Azer; Matta, Ibrahim (Boston University Computer Science Department, 2008-02-10)
    We consider a mobile sensor network monitoring a spatio-temporal field. Given limited cache sizes at the sensor nodes, the goal is to develop a distributed cache management algorithm to efficiently answer queries with a ...
  • Byers, John; Considine, Jeffrey; Mitzenmacher, Michael; Rost, Stanislav (Boston University Computer Science Department, 2002)
    Overlay networks have emerged as a powerful and highly flexible method for delivering content. We study how to optimize throughput of large, multipoint transfers across richly connected overlay networks, focusing on the ...
  • Duvos, Enrique; Bestavros, Azer (Boston University Computer Science Department, 2000-12-15)
    This paper presents the design and implementation of an infrastructure that enables any Web application, regardless of its current state, to be stopped and uninstalled from a particular server, transferred to a new server, ...
  • Alon, Jonathan; Sclaroff, Stan (Boston University Computer Science Department, 2000-12-04)
    Standard structure from motion algorithms recover 3D structure of points. If a surface representation is desired, for example a piece-wise planar representation, then a two-step procedure typically follows: in the first ...
  • Betke, Margrit; Wang, Jingbin; Ko, Jane P. (Boston University Computer Science Department, 2004-01-07)
    We introduce "BU-MIA," a Medical Image Analysis system that integrates various advanced chest image analysis methods for detection, estimation, segmentation, and registration. BU-MIA evaluates repeated computed tomography ...
  • Ocean, Michael J.; Kfoury, Assaf J.; Bestavros, Azer (Boston University Computer Science Department, 2006-09-16)
    The emergence of a sensor-networked world produces a clear and urgent need for well-planned, safe and secure software engineering. It is the role of universities to prepare graduates with the knowledge and experience to ...
  • Itkis, Gene; Maiss, Arwa (Boston University Computer Science Department, 2004-04-27)
    Usual password schemes suffer from the flaw that they are easy to steal. An attacker who has correctly observed a login session (by peeping, wiretapping and/or by launching a "man-in-the-middle" attack, etc.) can easily ...
  • Sclaroff, Stan; Del Bimbo, Alberto; Nunziati, Walter (Boston University Computer Science Department, 2005-05-19)
    We introduce a view-point invariant representation of moving object trajectories that can be used in video database applications. It is assumed that trajectories lie on a surface that can be locally approximated with a ...
  • Yuan, Quan; Sclaroff, Stan (Boston University Computer Science Department, 2009-07-12)
    A common design of an object recognition system has two steps, a detection step followed by a foreground within-class classification step. For example, consider face detection by a boosted cascade of detectors followed by ...
  • Diamant, Gali; Veytser, Leonid; Matta, Ibrahim; Bestavros, Azer; Guirguis, Mina; Guo, Liang; Zhang, Yuting; Chen, Sean (Boston University Computer Science Department, 2003-12-16)
    Internet Traffic Managers (ITMs) are special machines placed at strategic places in the Internet. itmBench is an interface that allows users (e.g. network managers, service providers, or experimental researchers) to register ...
  • Matta, Ibrahim; Riga, Niky; Medina, Alberto; Redi, Jason; Partridge, Craig (Boston University Computer Science Department, 2006-09-18)
    Within a recently developed low-power ad hoc network system, we present a transport protocol (JTP) whose goal is to reduce power consumption without trading off delivery requirements of applications. JTP has the following ...

Search OpenBU


Browse

Deposit Materials

Statistics