We present a new technique, early phase termination, for eliminating idle processors in parallel computations that use barrier synchronization. This technique simply terminates ea...
Skin detection is an important indicator of human presence and actions in many domains, including interaction, interfaces and security. It is commonly performed in three steps: tr...
Stephen Schmugge, Sriram Jayaram, Min C. Shin, Leo...
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
In this paper, we present a methodology for low-cost and rapid context switch for multithreaded embedded processors with realtime guarantees. Context-switch, which involves saving...
Online collaboration and sharing is the central theme of many webbased services that create the so-called Web 2.0 phenomena. Using the Internet as a computing platform, many Web 2...
Jiangming Yang, Haixun Wang, Ning Gu, Yiming Liu, ...