Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
Modern network intrusion detection systems need to perform regular expression matching at line rate in order to detect the occurrence of critical patterns in packet payloads. Whil...
This research is motivated by emerging, real-world wireless sensor network applications for monitoring and control. We examine the benefits and costs of caching data for such appli...
David J. Yates, Erich M. Nahum, Jim Kurose, Prasha...
– Explicit Congestion Notification (ECN) and Active Queue Management (AQM) Schemes such as Random Early Detection (RED), Adaptive Random Early Detection (ARED) and BLUE queues ha...
Visvasuresh Victor Govindaswamy, Gergely V. Z&aacu...
— Designing a localization system for a low-cost robotic consumer product poses a major challenge. In previous work, we introduced Vector Field SLAM [5], a system for simultaneou...
Jens-Steffen Gutmann, Gabriel Brisson, Ethan Eade,...