In the recent years, photo context metadata (e.g., date, GPS coordinates) have been proved to be useful in the management of personal photos. However, these metadata are still poo...
—New protection schemes for video on demand (VOD) in a DWDM ring network are proposed that employ information per customer. Unlike prior schemes that rely on fixed priorities, th...
Ornan Ori Gerstel, Galen H. Sasaki, Ashok Balasubr...
stractions from Proofs Ranjit Jhala1 Kenneth L. McMillan2 1 UC San Diego 2 Cadence Berkeley Laboratories We present a technique for using infeasible program paths to automatically ...
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Simulation lag is a known issue in networked virtual environments where users are geographically distributed. When users collaborate across the network using haptics, there are al...