Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
This paper describes part of the results of recent research carried out in Brazil and the UK, which investigated the perceptions by academic social scientists of the impact of ele...
Community wireless mesh networks (WMNs) are increasingly being deployed for providing cheap, low maintenance Internet access. For the successful adoption of WMNs as a last-mile te...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
The direct experience we had with teaching a summer pre-college computing course in which we adopted an online portfolio approach has led us to consider the use of online portfoli...