—In mobile environment, it is very common that mobile devices periodically stay in disconnection mode. In a networked world as today, computer users rely on network services so h...
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
This paper describes an experimental study of Linux kernel behavior in the presence of errors that impact the instruction stream of the kernel code. Extensive error injection exper...
Weining Gu, Zbigniew Kalbarczyk, Ravishankar K. Iy...
We present a novel box depalletizing system based on images acquired with a time of flight laser sensor mounted on the hand of the robot. Scanning the upper layer of the pallet y...
Network programming is notoriously hard to understand: one has to deal with a variety of protocols (IP, ICMP, UDP, TCP etc), concurrency, packet loss, host failure, timeouts, the c...