Current business conditions have given rise to distributed teams that are mostly collocated except for one remote member. These “hub-and-satellite” teams face the challenge of...
Gina Venolia, John C. Tang, Ruy Cervantes, Sara Bl...
Programming has recently become more common among ordinary end users of computer systems. We believe that these end-user programmers are not just coders but also designers, in tha...
Jill Cao, Yann Riche, Susan Wiedenbeck, Margaret M...
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
—Mobile devices can produce continuous streams of data which are often specific to the person carrying them. We show that cell phone tracks from the MIT Reality dataset can be u...
Computational puzzles are mildly difficult computational problems that require resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in secu...
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan...