Decades of research have explored factors that can influence green behavior. However, much less is known about the ways in which technology in general, and social technologies in ...
Jennifer Mankoff, Susan R. Fussell, Tawanna Dillah...
In utility computing environments, multiple users and applications are served from the same r esource pool. To maintain service level objectives and maintain high levels of utiliza...
Cipriano A. Santos, Akhil Sahai, Xiaoyun Zhu, Dirk...
Current post-mortem cyber-forensic techniques may cause significant disruption to the evidence gathering process by breaking active network connections and unmounting encrypted di...
Ellick Chan, Shivaram Venkataraman, Francis M. Dav...
In this note we discuss issues surrounding how to provide and use network measurement data made available for sharing among researchers. While previous work has focused on the tec...
— As CDMA-based cellular networks mature, the current point-to-point links used in connecting base stations to network controllers will evolve to an IP-based Radio Access Network...