In this paper, we propose a simple yet effective method of identifying traffic conditions on surface streets given location traces collected from on-road vehicles--this requires o...
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
In this paper we demonstrate a fully automated approach for discovering and monitoring patterns of daily activities. Discovering patterns of daily activities and tracking them can...
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
The central idea behind interface-based design is to describe components by a component interface. In contrast to a component description that describes what a component does, a c...