Now showing items 289-291 of 807

    • iJam: Jamming Oneself for Secure Wireless Communication 

      Katabi, Dina; Gollakota, Shyamnath (2010-06-07)
      Wireless is inherently less secure than wired networks because of its broadcast nature. Attacks that simply snoop on the wireless medium successfully defeat the security of even 802.11 networks using the most recent security ...
    • Power-Aware Computing with Dynamic Knobs 

      Misailovic, Sasa; Agarwal, Anant; Carbin, Michael; Sidiroglou, Stelios; Hoffmann, Henry; e.a. (2010-05-14)
      We present PowerDial, a system for dynamically adapting application behavior to execute successfully in the face of load and power fluctuations. PowerDial transforms static configuration parameters into dynamic knobs that ...
    • SIFT Flow: Dense Correspondence across Scenes and its Applications 

      Freeman, William T.; Torralba, Antonio; Yuen, Jenny; Liu, Ce (2010-05-08)
      While image alignment has been studied in different areas of computer vision for decades, aligning images depicting different scenes remains a challenging problem. Analogous to optical flow where an image is aligned to its ...