Cloud file systems offer organizations a scalable and reliable file stor...
Coresets are small, weighted summaries of larger datasets, aiming at
pro...
Due to the potentially severe consequences of coordinated cyber-physical...
We consider the problem of computing the k-means centers for a large
hig...
Cyber-physical attacks impose a significant threat to the smart grid, as...
This is a technical report, containing all the lemma and proposition pro...
This is a technical report, containing all the theorem proofs in the
fol...
This is a technical report, containing all the theorem proofs and additi...
This is a technical report, containing all the theorem proofs and additi...
This is a technical report, containing all the theorem proofs in paper "...
This is a technical report, containing all the theorem proofs in paper "...
This is a technical report, containing all the theorem proofs and additi...
This is a technical report, containing all the theorem proofs in paper "...
Effective defense against cyber-physical attacks in power grid requires ...
Distributed machine learning generally aims at training a global model b...
In this paper, we provide a rigorous theoretical investigation of an onl...
Mobile edge computing (MEC) is a promising technique for providing
low-l...
Motivated by the need of solving machine learning problems over distribu...
Boolean network tomography is a powerful tool to infer the state
(workin...
Emerging technologies and applications including Internet of Things (IoT...