Skip to main content

Showing 1–5 of 5 results for author: Bush, B

  1. arXiv:2407.00552  [pdf, ps, other

    cs.NI cs.GR

    Efficient Resource Management in Multicast Short Video Streaming Systems

    Authors: Betty Searcy, Zurh Farus, Bronny Bush, Kevin Muhammad, Zubair Clinton

    Abstract: The surge in popularity of short-form video content, particularly through platforms like TikTok and Instagram, has led to an exponential increase in data traffic, presenting significant challenges in network resource management. Traditional unicast streaming methods, while straightforward, are inefficient in scenarios where videos need to be delivered to a large number of users simultaneously. Mul… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

  2. arXiv:1906.08842  [pdf, other

    cs.CR

    T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing

    Authors: Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks

    Abstract: Since the inception of the Integrated Circuit (IC), the size of the transistors used to construct them has continually shrunk. While this advancement significantly improves computing capability, fabrication costs have skyrocketed. As a result, most IC designers must now outsource fabrication. Outsourcing, however, presents a security threat: comprehensive post-fabrication inspection is infeasible… ▽ More

    Submitted 27 October, 2020; v1 submitted 20 June, 2019; originally announced June 2019.

  3. arXiv:1906.08836  [pdf, other

    cs.CR

    An Extensible Framework for Quantifying the Coverage of Defenses Against Untrusted Foundries

    Authors: Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks

    Abstract: The transistors used to construct Integrated Circuits (ICs) continue to shrink. While this shrinkage improves performance and density, it also reduces trust: the price to build leading-edge fabrication facilities has skyrocketed, forcing even nation states to outsource the fabrication of high-performance ICs. Outsourcing fabrication presents a security threat because the black-box nature of a fabr… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

  4. arXiv:1803.04456  [pdf, other

    cs.CY

    Predicting Clinical Deterioration of Outpatients Using Multimodal Data Collected by Wearables

    Authors: Dingwen Li, Jay Vaidya, Michael Wang, Ben Bush, Chenyang Lu, Marin Kollef, Thomas Bailey

    Abstract: Hospital readmission rate is high for heart failure patients. Early detection of deterioration will help doctors prevent readmissions, thus reducing health care cost and providing patients with just-in-time intervention. Wearable devices (e.g., wristbands and smart watches) provide a convenient technology for continuous outpatient monitoring. In the paper, we explore the feasibility of monitoring… ▽ More

    Submitted 1 June, 2018; v1 submitted 12 March, 2018; originally announced March 2018.

  5. arXiv:1301.2561  [pdf, other

    cs.SI nlin.AO physics.soc-ph

    Modeling complex systems with adaptive networks

    Authors: Hiroki Sayama, Irene Pestov, Jeffrey Schmidt, Benjamin James Bush, Chun Wong, Junichi Yamanoi, Thilo Gross

    Abstract: Adaptive networks are a novel class of dynamical networks whose topologies and states coevolve. Many real-world complex systems can be modeled as adaptive networks, including social networks, transportation networks, neural networks and biological networks. In this paper, we introduce fundamental concepts and unique properties of adaptive networks through a brief, non-comprehensive review of recen… ▽ More

    Submitted 11 January, 2013; originally announced January 2013.

    Comments: 24 pages, 11 figures, 3 tables

    Journal ref: Computers and Mathematics with Applications, 65, 1645-1664 (2013)