Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded ...
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean...
Several features such as reconfiguration, voltage and frequency scaling, low-power operating states, duty-cycling, etc. are exploited for latency and energy efficient application ...
This paper presents a framework for indoor location prediction system using multiple wireless signals available freely in public or office spaces. We first proabstract architectur...
This paper addresses two important challenges for current P2P systems, namely churn and selfishness. First, we report on a system [19] whose desirable properties (small peer degre...
Stefan Schmid, Fabian Kuhn, Thomas Moscibroda, Rog...
: E-Learning offers the advantage of interactivity: an E-Learning system can adapt the learning materials to suit the learner’s personality and his goals, and it can react to the...