The widespread distribution and availability of smallscale sensors, actuators, and embedded processors is transforming the physical world into a computing platform. One such examp...
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverā...
Virtual memory has been successfully used in diļ¬erent domains to extend the amount of memory available to applications. We have adapted this mechanism to sensor networks, where,...
Software defects signiļ¬cantly reduce system dependability. Among various types of software bugs, semantic and concurrency bugs are two of the most diļ¬cult to detect. This pape...
Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weiha...
The transition of personal information management (PIM) tools oļ¬ the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...