We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
This paper presents Haggle, an architecture for mobile devices that enables seamless network connectivity and application functionality in dynamic mobile environments. Current appl...
Jing Su, James Scott, Pan Hui, Jon Crowcroft, Eyal...
Abstract. While the user-centered design methods we bring from humancomputer interaction to ubicomp help sketch ideas and refine prototypes, few tools or techniques help explore di...
Scott Davidoff, Min Kyung Lee, Anind K. Dey, John ...
Over recent years automated face detection and recognition (FDR) have gained significant attention from the commercial and research sectors. This paper presents an embedded face de...
Abbas Bigdeli, Colin Sim, Morteza Biglari-Abhari, ...