Abstract. Embedded information assurance applications that are critical to national and international infrastructures, must often adhere to certification regimes that require infor...
In this paper we present the results of a field study of Avaaj Otalo (literally, “voice stoop”), an interactive voice application for small-scale farmers in Gujarat, India. T...
Neil Patel, Deepti Chittamuru, Anupam Jain, Paresh...
— Existing stream processing systems are optimized for a specific metric, which may limit their applicability to diverse applications and environments. This paper presents XFlow...
Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties...
Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Pen...
In this paper, we present a proposal for Patients’ Mobile Monitoring. This framework enables the definition and generation of profiles, modules and communication structures betwe...
Vladimir Villarreal, Javier Laguna, Silvia L&oacut...