We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
—Applications on mobile computers must adapt to high variability in wireless network performance. Extending the semantics of transport protocols to offer more control over commun...
We propose a wearable active camera with laser pointer (WACL) as a human interface device for use in telecommunications. The WACL laser pointer is attached to the active camera-he...
The functionality that is provided by Mass Storage Systems can be implemented using data grid technology. Data grids already provide many of the required features, including a log...
Michael Wan, Arcot Rajasekar, Reagan Moore, Phil A...
Inherent dangers in mining operations motivate the use of robotic technology for addressing hazardous situations that prevent human access. In the context of this case study, we e...
Aaron Morris, Derek Kurth, Daniel Huber, Warren Wh...