Learn More
Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world. As applied to privacy, DIFC allows untrusted software to compute with private data while trusted security code controls the release of that data. As applied to(More)
Based on developmental biology's Rule of Normal Neighbors, we develop a new mechanism for spatial patterning, exhibiting spontaneous symmetry breaking, regeneration, and approximate scale invariance. The desired pattern is represented as a topological adjacency graph, yielding an energy function that cells minimize through local interactions. Combined with(More)
Today's Web depends on a particular pact between sites and users: sites invest capital and labor to create and market a set of features, and users gain access to these features by giving up control of their data (photos, personal information, creative musings, etc.). This paper imagines a very different Web ecosystem, in which users retain control of their(More)
We present a secure service prototype built from untrusted, contributed code. The service manages private data for a variety of different users, and user programs frequently require access to other users' private data. However, aside from covert timing channels, no part of the service can corrupt private data or leak it between users or outside the system(More)
In May of 2011, a live mass stranding of 26 short-finned pilot whales (Globicephala macrorhynchus) occurred in the lower Florida Keys. Five surviving whales were transferred from the original stranding site to a nearby marine mammal rehabilitation facility where they were constantly attended to by a team of volunteers. Bacteria cultured during the routine(More)
Today's Web depends on a particular pact between sites and users: sites invest capital and labor to create and market a set of features, and users gain access to these features by giving up control of their data (photos, personal information, creative musings, etc.). This paper imagines a very different Web ecosystem, in which users retain control of their(More)
How might organisms grow into their desired physical forms in spite of environmental and genetic variation? How do they maintain this form in spite of physical insults? This article presents a case study in simulated morphogenesis, using a physics-based model for embryonic epithelial tissue. The challenges of the underlying physics force the introduction of(More)
This thesis considers the application of network coding and opportunistic routing to improve the performance of multicast flows in wireless networks. Network coding allows routers to randomly mix packets before forwarding them. This randomness ensures that routers that hear the same transmission are unlikely to forward the same packets, which permits(More)