Abstract. Denial-of-Service (DoS) attacks remain a challenging problem in the Internet. In a DoS attack the attacker is attempting to make a resource unavailable to its intended le...
Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, ...
Distributed storage systems often use data replication to mask failures and guarantee high data availability. Node failures can be transient or permanent. While the system must ge...
Jing Tian, Zhi Yang, Wei Chen, Ben Y. Zhao, Yafei ...
A noise map facilitates monitoring of environmental noise pollution in urban areas. It can raise citizen awareness of noise pollution levels, and aid in the development of mitigat...
Rajib Kumar Rana, Chun Tung Chou, Salil S. Kanhere...
In region surveillance applications, sensors oftentimes accumulate an overwhelmingly large amount of data, making it infeasible to process all of the collected data in real-time. ...
— We present a modular robot design inspired by the creation of complex structures and functions in biology via deformation. Our design is based on the Tensegrity model of cellul...
Chih-Han Yu, Kristina Haller, Donald E. Ingber, Ra...