In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
The ability to automatically detect `visually interesting' regions in an image has many practical applications especially in the design of active machine vision systems. This...
Umesh Rajashekar, Lawrence K. Cormack, Alan C. Bov...
This paper suggests that the thermal state of a processor can be approximated using data flow analysis. The results of this analysis can be used to evaluate the efficacy of therma...
The focus of this panel will be on aging and technology. The intent is to demonstrate how technology can be used to help older adults remain independent, productive and connected ...
Herman Bouma, Sara J. Czaja, Hiroyuki Umemuro, Wen...
We present Flow-based Management Language (FML), a declarative policy language for managing the configuration of enterprise networks. FML was designed to replace the many dispara...
Timothy L. Hinrichs, Natasha Gude, Martin Casado, ...