The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
A numerical scheme for bubble trajectories including their collisions is developed. An Eulerian-Lagrangian computational scheme is used to study the bubble trajectories. The 2D ave...
Size-based policies have been shown in the literature to effectively balance load and improve performance in cluster environments. Size-based policies assign jobs to servers based...
In this paper we investigate shape and motion retrieval in the context of multi-camera systems. We propose a new lowlevel analysis based on latent silhouette cues, particularly su...
Li Guan, Jean-Sebastien Franco, Edmond Boyer, Marc...
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...