OpenBU

Browsing CAS: Computer Science: Technical Reports by Title

OpenBU

Browsing CAS: Computer Science: Technical Reports by Title

Sort by: Order: Results:

  • Bestavros, Azer (Boston University Computer Science Department, 1996-01-05)
    The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the significant asymmetry between downstream and upstream communication ...
  • Kfoury, Assaf (Computer Science Department, Boston University, 2012-02-17)
    A flow network N is a capacited finite directed graph, with multiple input ports/arcs and multiple output ports/arcs. A flow f in N assigns a non-negative real number to every arc and is feasible if it satisfies flow ...
  • Oliart, Alberto (Boston University Computer Science Department, 1994-12-14)
    This report presents an algorithm, and its implementation, for doing type inference in the context of Quasi-Static Typing (QST) ["Quasy-static Typing." Satish Thatte Proc. ACM Symp. on Principles of Programming Languages, ...
  • Thangali, Ashwin; Sclaroff, Stan (Boston University Computer Science Department, 2009-03-11)
    Locating hands in sign language video is challenging due to a number of factors. Hand appearance varies widely across signers due to anthropometric variations and varying levels of signer proficiency. Video can be captured ...
  • Morcos, Hany; Bestavros, Azer; Matta, Ibrahim (Boston University Computer Science Department, 2006-10-04)
    Personal communication devices are increasingly equipped with sensors for passive monitoring of encounters and surroundings. We envision the emergence of services that enable a community of mobile users carrying such ...
  • Morcos, Hany; Bestavros, Azer; Matta, Ibrahim (Boston University Computer Science Department, 2006-04-14)
    Abstract—Personal communication devices are increasingly being equipped with sensors that are able to passively collect information from their surroundings – information that could be stored in fairly small local caches. ...
  • Lakhina, Anukool; Papagiannaki, Konstantina; Crovella, Mark; Diot, Christophe; Kolaczyk, Eric D.; Taft, Nina (Boston University Computer Science Department, 2003-11-20)
    In a recent paper, Structural Analysis of Network Traffic Flows, we analyzed the set of Origin Destination traffic flows from the Sprint-Europe and Abilene backbone networks. This report presents the complete set of results ...
  • Sweha, Raymond; Ishakian, Vatche; Bestavros, Azer (Computer Science Department, Boston University, 2011-12-14)
    Increasingly, commercial content providers (CPs) offer streaming and IPTV solutions that leverage an underlying peer-to-peer (P2P) stream distribution architecture. The use of P2P protocols promises significant scalability ...
  • Sweha, Raymond; Ishakian, Vatche; Bestavros, Azer (CS Department, Boston University, 2010-08-12)
    Leveraging client upload capacity through peer-assisted content distribution was shown to decrease the load on content providers, while also improving average distribution times. These benefits, however, are limited by the ...
  • Sweha, Raymond; Bestavros, Azer; Byers, John (Boston University Computer Science Department, 2009-02-10)
    This paper proposes the use of in-network caches (which we call Angels) to reduce the Minimum Distribution Time (MDT) of a file from a seeder – a node that possesses the file – to a set of leechers – nodes who are interested ...
  • Sweha, Raymond (Boston University Computer Science Department, 2009-08-06)
    This thesis proposes the use of in-network caches (which we call Angels) to reduce the Minimum Distribution Time (MDT) of a file from a seeder – a node that possesses the file – to a set of leechers – nodes who are interested ...
  • Athitsos, Vassilis; Sclaroff, Stan (Boston University Computer Science Department, 2001)
    An appearance-based framework for 3D hand shape classification and simultaneous camera viewpoint estimation is presented. Given an input image of a segmented hand, the most similar matches from a large database of synthetic ...
  • Bestavros, Azer; Carter, Robert L.; Crovella, Mark E.; Cunha, Carlos R.; Heddaya, Abdelsalam; Mirdad, Sulaiman A. (Boston University Computer Science Department, 1995-01-15)
    With the increasing demand for document transfer services such as the World Wide Web comes a need for better resource management to reduce the latency of documents in these systems. To address this need, we analyze the ...
  • Xi, Hongwei; Zhu, Dengping; Li, Yanka (Boston University Computer Science Department, 2005-02-10)
    We present a type system that can effectively facilitate the use of types in capturing invariants in stateful programs that may involve (sophisticated) pointer manipulation. With its root in a recently developed framework ...
  • Bash, Boulat A.; Byers, John W.; Considine, Jeffrey (Boston University Computer Science Department, 2004-07-19)
    Recent work in sensor databases has focused extensively on distributed query problems, notably distributed computation of aggregates. Existing methods for computing aggregates broadcast queries to all sensors and use ...
  • Tian, Tai-Peng; Li, Rui; Sclaroff, Stan (Boston University Computer Science Department, 2005-07-07)
    A learning based framework is proposed for estimating human body pose from a single image. Given a differentiable function that maps from pose space to image feature space, the goal is to invert the process: estimate the ...
  • Boddapati, Gowtham; Day, John; Matta, Ibrahim; Chitkushev, Lou (Boston University Computer Science Department, 2009-06-22)
    The TCP/IP architecture was originally designed without taking security measures into consideration. Over the years, it has been subjected to many attacks, which has led to many patches to counter them. Our investigations ...
  • Li, Feifei; Hadjieleftheriou, Marios; Kollios, George; Reyzin, Leonid (Boston University Computer Science Department, 2006-07-20)
    In an outsourced database system the data owner publishes information through a number of remote, untrusted servers with the goal of enabling clients to access and query the data more efficiently. As clients cannot trust ...
  • Li, Feifei; Hadjieleftheriou, Marios; Kollios, George; Reyzin, Leonid (Boston University Computer Science Department, 2006-04-22)
    In outsourced database (ODB) systems the database owner publishes its data through a number of remote servers, with the goal of enabling clients at the edge of the network to access and query the data more efficiently. As ...
  • Erdem, Ugur Murat; Sclaroff, Stan (Boston University Computer Science Department, 2004-04-15)
    In many multi-camera vision systems the effect of camera locations on the task-specific quality of service is ignored. Researchers in Computational Geometry have proposed elegant solutions for some sensor location problem ...

Search OpenBU


Browse

Deposit Materials

Statistics