We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does not require any hardware support such as secure...
Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perr...
Energy management is a critical concern in wireless sensornets. Despite its importance, sensor network operating systems today provide minimal energy management support, requiring...
Kevin Klues, Vlado Handziski, Chenyang Lu, Adam Wo...
This paper illustrates how canonical correlation analysis can be used for designing efficient visual operators by learning. The approach is highly task oriented and what constitute...
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
: The integration of information systems is not a new challenge. As one instrument, standards provide interfaces for integrated information systems. With regard to the recent adven...
Markus Bick, Tyge Kummer, Jan M. Pawlowski, Patric...