Learn More
– End-to-end connections experience a high level of diversity in network characteristics. At one extreme, an application may receive highly degraded service, leaving the application unusable. At another extreme, the costs to guarantee some level of service may be undesirably high to the user or overall system. Open architecture networks help applications(More)
b b Computer networks are becoming more complex and diverse. Increasingly, an end-to-end connection will traverse several links with orders of magnitude differences in characteristics such as bandwidth, latency, error rate, jit-ter, and monetary cost. At the same time, most applications assume a level of network characteristics below which they either(More)
Server-class computers cannot consume power without bound, since increased energy consumption translates into increased heat dissipation, greater cooling requirements, reduced computational density, and higher operating costs. For a typical data center, storage alone accounts for 27% of the energy consumption, making storage an important target for energy(More)
Truffles is a system meant to address some of the major issues that still make it difficult to share files between users at different sites. In particular, it addresses the problems associated with secure file sharing, and the problems of high administrative overhead. Truffles will combine facilities of the Ficus file system and TIS/PEM, a privacy enhanced(More)
— We describe the Smart Party, a new ubiquitous computing application for the home environment. This application gathers musical preferences for guests in different rooms of a party in a user's house. Based on their preferences and available media, it chooses a music play list for each room, adjusting to changing membership as guests move through the party.(More)
—The increasing popularity and acceptance of VANETs will make the deployment of autonomous vehicles easier and faster since the VANET will reduce dependence on expensive sensors. However, these benefits are counterbalanced by possible security attacks. We demonstrate a VANET-based botnet attack in an autonomous vehicle scenario that can cause serious(More)