Now showing items 169-171 of 807

    • A Plan for Optimizing Network-Intensive Cloud Applications 

      LaCurts, Katrina; Deng, Shuo; Balakrishnan, Hari (2013-02-12)
      A significant and growing number of applications deployed on cloud infrastructures are network-intensive. These applications are frequently bottlenecked by the speed of network connections between the machines on which ...
    • Asynchronous Failure Detectors 

      Cornejo, Alejandro; Lynch, Nancy; Sastry, Srikanth (2013-01-30)
      Failure detectors -- oracles that provide information about process crashes -- are an important abstraction for crash tolerance in distributed systems. The generality of failure-detector theory, while providing great ...
    • Securing Deployed RFIDs by Randomizing the Modulation and the Channel 

      Wang, Jue; Hassanieh, Haitham; Katabi, Dina; Kohno, Tadayoshi (2013-01-12)
      RFID cards are widely used today in sensitive applications such as access control, payment systems, and asset tracking. Past work shows that an eavesdropper snooping on the communication between a card and its legitimate ...