In Ubiquitous computing environment the mobile devices such as PDAs necessarily connect to remote storage servers. We present an iSCSI caching system that localizes iSCSI target to...
We present TouchCounters, an integrated system of electronic modules, physical storage containers, and shelving surfaces for the support of collaborative physical work. Through ph...
Inferno is an operating system well suited to applications that need to be portable, graphical, and networked. This paper describes the fundamental
oating point facilities of the...
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
Peer-to-peer file-sharing networks depend on peers uploading data to each other. Some peers, called free-riders, will not upload data unless there is an incentive to do so. Algor...
Jacob Jan-David Mol, Johan A. Pouwelse, Dick H. J....