Learn More
Over the past two or three years, wireless cellular networks have become faster than before, most notably due to the deployment of LTE, HSPA+, and other similar networks. LTE throughputs can reach many megabits per second and can even rival WiFi throughputs in some locations. This paper addresses a fundamental question confronting transport and(More)
Cloud computing infrastructures are increasingly being used by network-intensive applications that transfer significant amounts of data between the nodes on which they run. This paper shows that tenants can do a better job placing applications by understanding the underlying cloud network as well as the demands of the applications. To do so, tenants must be(More)
Mobile devices come with an assortment of networks: WiFi in two different frequency bands, each of which can run in infrastructure-mode, WiFi-Direct mode, or ad hoc mode; cellular radios, which can run in LTE/4G, 3G, or EDGE modes; and Bluetooth. But how should an app choose which network to use? There is no systematic solution to this problem today: in(More)
Excerpted from "Glimpse: Continuous, Real-Time Object Recognition on Mobile Devices" from Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems with permission. http://dx.doi.org/10.1145/2809695.2809711 © ACM 2015. Glimpse is a continuous, real-time object recognition system for camera-equipped mobile devices. Glimpse captures(More)
This paper presents Delphi, a mobile software controller that helps applications select the best network among available choices for their data transfers. Delphi optimizes a specified objective such as transfer completion time, or energy per byte transferred, or the monetary cost of a transfer. It has four components: a performance predictor that uses(More)
A significant and growing number of applications deployed on cloud infrastructures are network-intensive. These applications are frequently bottlenecked by the speed of network connections between the machines on which they are deployed. Due to the complexity and size of cloud networks, such applications often run slowly or have unpredictable completion(More)
In this paper, extended explicit pseudo two-step Runge-Kutta-Nyström (EEPTSRKN) methods for the numerical integration of oscillatory system y ″ + M y = f(y) are proposed and studied. These methods inherit the framework of explicit pseudo two-step Runge-Kutta-Nyström (EPTSRKN) methods (Cong et al. Comput. Math. Appl. 38, 17–39, 1999) and they are parallel(More)
Background Subtraction techniques are the basis for moving target detection and tracking in the domain of video surveillance, while the robust and reliable detection and tracking algorithms in complex environment is a challenging subject, so evaluations of various background subtraction algorithms are of great significance. Nine state of the art methods(More)