This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
We introduce a new technique for determining a mobile phone’s indoor location even when Wi-Fi infrastructure is unavailable or sparse. Our technique is based on a new ambient so...
Stephen P. Tarzia, Peter A. Dinda, Robert P. Dick,...
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
In this paper, we study the wireless synchronization problem which requires devices activated at different times on a congested single-hop radio network to synchronize their roun...
The emerging Car-to-Car communication (C2C) technology, known as Wireless Access in Vehicular Environments (WAVE), enables vehicles on the roadway to communicate with each other a...
Yunpeng Zang, Erik Weiss, Lothar Stibor, Hui Chen,...