Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit int...
Konstantinos Pelechrinis, Ioannis Broustis, Srikan...
Abstract. This paper describes the design and evaluation of an adaptive museum guide for families. In the Kurio system, a mixture of embedded and tangible technology imbues the mus...
Marek Hatala, Karen Tanenbaum, Ron Wakkary, Kevin ...
This paper addresses the design considerations and critical evaluation of a novel embodiment for wearable photoplethysmography (PPG) comprising a magnetic earring sensor and wirele...
Ming-Zher Poh, Nicholas C. Swenson, Rosalind W. Pi...
One of the simplest ways to query a database is through a form, where a user can fill in relevant information and obtain desired results by submitting the form. Designing good sta...
We present the design, implementation, and evaluation of post-copy based live migration for virtual machines (VMs) across a Gigabit LAN. Live migration is an indispensable feature...