We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
This paper presents a set of techniques for providing fine-grained failover of long-running connections across a distributed collection of replica servers, and is especially usefu...
Alex C. Snoeren, David G. Andersen, Hari Balakrish...
This paper investigated how people navigate through early Wireless Application Protocol (WAP) sites using their common-sense knowledge of social structures. The study is based on ...
: Children's privacy has become critical with the increasing use of the Internet for commercial purposes and corresponding increase in requests for information. 65% of childre...
Karthik Channakeshava, Kaigui Bian, Michael S. Hsi...
We consider a swarm of robots equipped with an infrared range and bearing device that is able both to make estimates of the relative distance and angle between two robots in line-o...
Gianni A. Di Caro, Frederick Ducatelle, Luca Maria...