Learn More
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or groups have highly heterogeneous resources and security and privacy concerns, and invariably belong to different security or administrative domains. Flexible and automated mechanisms(More)
Many areas have dense deployments of 802.11 wireless access points, often with little or no planning of the best choices of channel assignments. As a result, there is often very high interference due to poor channel assignments. One contributing factor is that many access points are deployed with the absolute minimum of configuration effort, which means(More)
— We describe the Smart Party, a new ubiquitous computing application for the home environment. This application gathers musical preferences for guests in different rooms of a party in a user's house. Based on their preferences and available media, it chooses a music play list for each room, adjusting to changing membership as guests move through the party.(More)
Future environments will require devices to be automatically and safely configured to perform important tasks. Security concerns based on known vulnerabilities within the Internet make it clear that any widely deployed computing infrastructure must be designed from the start with substantially more security. However, existing security models cannot handle(More)
Amazon's Mechanical Turk service has been successfully applied to many natural language processing tasks. However, the task of named entity recognition presents unique challenges. In a large annotation task involving over 20,000 emails, we demonstrate that a compet­ itive bonus system and inter­annotator agree­ ment can be used to improve the quality of(More)
Multiplayer games are representative of a large class of distributed applications that suffer from redundant communication, bottlenecks and poor reactivity to changing network conditions. Many of these problems can be alleviated through simple network adaptations at the infrastructure level. In our model, game packets are directed along the edges of a tree(More)
For worms with known signatures, properly configured firewalls can prevent infection of a network from the outside. However, as several recent worms have shown, portable computers provide worms with an entry point into such networks, since these computers are connected behind the firewall. Once inside, the firewall provides no protection against the worm's(More)
Panda is middleware designed to bring the benefits of active networks to applications not written with active networks in mind. This paper describes the architecture and implementation of Panda, and provides data on the overheads incurred and performance benefits achieved. The paper also discusses some of the key issues of automatically and transparently(More)
Modern technology and omnipresent computing and communication facilities are leading us closer to the ubiquitous computing vision. However, the very nature of ubicomp infrastructure, the openness of the environments and the characteristics of the interactions pose unique security and privacy challenges. We anticipate that the vast number of interactions(More)