Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Evaluating available bandwidth estimation methods requires a malleable MAC protocol implementation, precise MAC layer packet timing measurements, and the ability to create control...
In this paper, a function-based extension of Extensible 3D (X3D) is proposed. The extension allows authors to use analytical functions to define geometry, color, 3D texture as wel...
Atomic broadcast in particular, and group communication in general, have mainly been specified and implemented in a system model where processes do not recover after a crash. The...
Lehigh University has recently implemented a new PC deployment model which is built around the Universal Imaging Utility, a product of Big Bang, LLC. This model has allowed Lehigh...