Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...
— Teleoperated robots generally receive high level commands from a remote system, while accomplishing motion control through conventional means. We present a teleoperated system ...
Storage systems manage quotas to ensure that no one user can use more than their share of storage, and that each user gets the storage they need. This is difficult for large, dis...
Kristal T. Pollack, Darrell D. E. Long, Richard A....
The volume of online data content has shown an un precedented growth in recent years. Fueling this growth are new federal regulations which warrant longer data re tention and ...
NagaPramod Mandagere, Jim Diehl, David Hung-Chang ...
— This paper presents the prototype of an expert peering system for information exchange in the knowledge society. Our system realizes an intelligent, real-time search engine for...
Christian Bauckhage, Tansu Alpcan, Sachin Agarwal,...