The dramatic growth of computer networks creates both an opportunity and a daunting distributed computing problem for users seeking to build applications that can configure themse...
Kenneth P. Birman, Robbert van Renesse, James Kauf...
We propose a novel method for computing a fourdimensional (4D) representation of the spatio-temporal visual hull of a dynamic scene, based on an extension of a recent provably cor...
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Web mail providers rely on users to “vote” to quickly and collaboratively identify spam messages. Unfortunately, spammers have begun to use bots to control large collections o...
Anirudh Ramachandran, Anirban Dasgupta, Nick Feams...