Abstract. The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approach...
Giovanni Russello, Changyu Dong, Naranker Dulay, M...
Aggregating multiple 802.11 Access Point (AP) backhauls using a single-radio WLAN card has been considered as a way of bypassing the backhaul capacity limit. However, current AP a...
Domenico Giustiniano, Eduard Goma Llairo, Alberto ...
Cloud storage is an emerging infrastructure that offers Platforms as a Service (PaaS). On such platforms, storage and compute power are adjusted dynamically, and therefore it is i...
In future multi-cores, large amounts of delay and power will be spent accessing data in large L2/L3 caches. It has been recently shown that OS-based page coloring allows a non-uni...
Manu Awasthi, Kshitij Sudan, Rajeev Balasubramonia...
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...