Tiffany Tang

Learn More
Memory corruption attacks continue to be a major vector of attack for compromising modern systems. Numerous defenses have been proposed against memory corruption attacks, but they all have their limitations and weaknesses. Stronger defenses such as complete memory safety for legacy languages (C/C++) incur a large overhead, while weaker ones such as(More)
Memory corruption attacks continue to be a major vector of attack for compromising modern systems. Numerous defenses have been proposed against memory corruption attacks, but they all have their limitations and weaknesses. Stronger defenses such as complete memory safety for legacy languages (C/C++) incur a large overhead, while weaker ones such as(More)
We report on the demonstration of three-dimensional optical trapping inside the core of a hollow-core microstructured optical fiber specifically designed and fabricated for this purpose. Optical trapping was achieved by means of an external tweezers beam incident transversely on the fiber and focused through the fiber cladding. Trapping was achieved for a(More)
This paper describes an gesture-based system suitable for use in a party. With the Microsoft Kinect for Windows sensor, LEDs or lamps, Arduino, and a set of Relay Shield for Arduino, our module creates an immersive ambient entertainment environment that is responsive and sensitive to the presence of users reflected by their gestures, feet movements, and can(More)
  • 1