—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
Although they have been the main server technology for many years, multiprocessors are undergoing a renaissance due to multi-core chips and the attractive scalability properties of...
— We address the problem of scheduling multiple traffic streams associated with target profiles on a shared wireless link, arising in real-time applications with soft/flexible...
The elastic task model proposed by Buttazzo, et. al. [9] is a powerful model for adapting real-time systems in the presence of uncertainty. This paper generalizes the existing ela...
Thidapat Chantem, Xiaobo Sharon Hu, Michael D. Lem...
Front projection allows large displays to be deployed relatively easily. However, it is sometimes difficult to find a location to place a projector, especially for ad-hoc instal...
Jay Summet, Matthew Flagg, James M. Rehg, Gregory ...