Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Users frequently have to choose between functionality and security. When running popular Web browsers or email clients, they frequently find themselves turning off features such a...
In this paper we model and study the performance of peer-to-peer (P2P) file sharing systems in terms of their `service capacity'. We identify two regimes of interest: the tra...
This paper presents the middleware needed to deploy jobs to non-geographically colocated clusters with decentralized look-up severs. We have named our framework the Initium Remote...
Modern enterprise, web, and multimedia applications are generating unstructured content at unforeseen volumes in the form of documents, texts, and media files. Such content is gen...
Krishna Kunchithapadam, Wei Zhang, Amit Ganesh, Ni...