|
|
Creator | Title | Description | Subject | Date |
1 |
|
Kasera, Sneha K. | Exploiting altruism in social networks for friend-to-friend malware detection | We propose a novel malware detection application- SocialScan-which enables friend-to-friend (f2f) malware scanning services among social peers, with scanning resource sharing governed by levels of social altruism. We show that with f2f sharing of resources, SocialScan achieves a 65% increase in the ... | | 2014-01-01 |
2 |
|
Kasera, Sneha K. | Violating privacy through walls by passive monitoring of radio windows | We investigate the ability of an attacker to passively use an otherwise secure wireless network to detect moving people through walls. We call this attack on privacy of people a "monitoring radio windows" (MRW) attack. We design and implement the MRW attack methodology to reliably detect when a pers... | | 2014-01-01 |
3 |
|
Brunvand, Erik L. | Speculatorum Oculi | Description Speculatorum Oculi (The Eyes of Spies) comments on current surveillance activities of governments and corporations through an installation that includes an architectural model surveilled with looming video cameras providing live feeds to a set of video monitors. These monitors show views... | | 2014-01-01 |
4 |
|
Evans, David | Improving communication between man and computers: some recent developments | | | 1967-10-11 |
5 |
|
Kasera, Sneha K. | Enhancing covert communications with multiple colluding receivers | Traditional (single receiver) system setup: ? Choose exploit field (e.g. last byte of TCP Timestamp) ? Alice: probabilistically inject parts of coded message into field ? Bob: extract symbols from field, decode to correct errors ?Warden: assume full knowledge of system and keys Can we create un... | | 2010-10-06 |
6 |
|
Kasera, Sneha K. | Secret key extraction using Bluetooth wireless signal strength measurements | Bluetooth has found widespread adoption in phones, wireless headsets, stethoscopes, glucose monitors, and oximeters for communication of, at times, very critical information. However, the link keys and encryption keys in Bluetooth are ultimately generated from a short 4 digit PIN, which can be crack... | | 2014-01-01 |
7 |
|
Freire, Juliana | Personalizing the web using site descriptions | The information overload on the Web has created a great need for efficient filtering mechanisms. Many sites (e.g., CNN and Quicken) address this problem by allowing a user to create personalized pages that contain only information that is of interest to the user. We propose a new approach for p... | XPointer; Data extraction; Site descriptions; Personalized web pages | 1999 |
8 |
|
Painter, James S. | Radioptimization - Goal based rendering | This paper presents a method for designing the illumination in an environment using optimization techniques applied to a radiosity based image synthesis system. An optimization of lighting parameters is performed based on user specified constraints and objectives for the illumination of t h e envir... | Radioptimization; Illumination; Optimization; Lighting parameters; Radiosity based image synthesis | 1993 |
9 |
|
Hibler, Michael J. | The flask security architecture: system support for diverse security policies | Operating systems must be flexible in their support for security policies, i.e., the operating system must provide sufficient mechanisms for supporting the wide variety of real-world security policies. Systems claiming to provide this support have failed to do so in two ways: they either fail to pro... | Flask; Security architecture | 1998 |
10 |
|
Susarla, Sai R.; Carter, John | DataStations: ubiquitous transient storage for mobile users | In this paper, we describe DataStations, an architecture that provides ubiquitous transient storage to arbitrary mobile applications. Mobile users can utilize a nearby DataStation as a proxy cache for their remote home file servers, as a file server to meet transient storage needs, and as a platf... | DataStations; Ubiquitous transient storage; Proxy cache | 2003-11-14 |
11 |
|
McDirmid, Sean; Hsieh, Wilson C.; Flatt, Matt | Expressive modular linking for object-oriented languages | In this paper we show how modular linking of program fragments can be added to statically typed, object-oriented (OO) languages. Programs are being assembled out of separately developed software components deployed in binary form. Unfortunately, mainstream OO languages (such as Java) still do not ... | Modular linking; Program fragments | 2002-10-11 |
12 |
|
Venkatasubramanian, Suresh | Efficient protocols for distributed classification and optimization | A recent paper [1] proposes a general model for distributed learning that bounds the communication required for learning classifiers with e error on linearly separable data adversarially distributed across nodes. In this work, we develop key improvements and extensions to this basic model. Our first... | | 2012-01-01 |
13 |
|
Morelli, Robert | Formal aspects of anonymity | We present a formal definition of anonymity in the context of concurrent processes. The definition is given in category theoretic terms. Moreover, the concept of a split cofibration is shown to both simplify the analysis of anonymity as well as to increase the framework's expressiveness. Because ... | Anonymity; Concurrent processes | 2002-01-15 |
14 |
|
Back, Godmar V. | Processes in KaffeOS: lsolation, resource management, and sharing in Java | Single-language runtime systems, in the form of Java virtual machines, are widely deployed platforms for executing untrusted mobile code. These runtimes provide some of the features that operating systems provide: inter-application memory protection and basic system services. They do not. however, p... | KaffeOS; Single-language; Java virtual machines; Mobile code; Runtimes | 2000 |
15 |
|
Kasera, Sneha K. | Monitoring breathing via signal strength in wireless networks | This paper shows experimentally that standard wireless networks which measure received signal strength (RSS) can be used to reliably detect human breathing and estimate the breathing rate, an application we call "BreathTaking". We present analysis showing that, as a first order approximation, breath... | | 2014-01-01 |
16 |
|
Back, Godmar V. | Java operating systems: design and implementation | Language-based extensible systems such as Java use type safety to provide memory safety in a single address space. Memory safety alone, however, is not sufficient to protect different applications from each other. such systems must support a process model that enables the control and management of c... | Java operating systems; Language-based systems | 1998 |
17 |
|
Davis, A.L. | Dataflow computers: a tutorial and survey | The demand for very high performance computer has encouraged some researchers in the computer science field to consider alternatives to the conventional notions of program and computer organization. The dataflow computer is one attempt to form a new collection of consistent systems ideas to improve ... | Dataflow computers | 1980 |
18 |
|
Wehrli, Robert | ARCAID: The ARChitects computer graphics AID | ARCAID?The ARChitect's Computer Graphics AID?is one part of a two-part research program at the University of Utah under the direction of David C. Evans. ARCAID is a specification for the organization of computer processes including data and procedures for the use of architects, engineers, and other... | ARCAID | 1970 |