Learn More
OceanStore is a utility infrastructure designed to span the globe and provide continuous access to persistent information. Since this infrastructure is comprised of untrusted servers, data is protected through redundancy and cryptographic techniques. To improve performance, data is allowed to be cached anywhere, anytime. Additionally, monitoring of usage(More)
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective tools for executing spam campaigns and spreading malware. Intuitively, a user is more likely to respond to a message from a Facebook friend than from a stranger, thus making(More)
Jasmonates (JAs) mediate plant responses to insect attack, wounding, pathogen infection, stress, and UV damage and regulate plant fertility, anthocyanin accumulation, trichome formation, and many other plant developmental processes. Arabidopsis thaliana Jasmonate ZIM-domain (JAZ) proteins, substrates of the CORONATINE INSENSITIVE1 (COI1)-based SCF(COI1)(More)
Zero-day polymorphic worms pose a serious threat to the security of Internet infrastructures. Given their rapid propagation, it is crucial to detect them at edge networks and automatically generate signatures in the early stages of infection. Most existing approaches for automatic signature generation need host information and are thus not applicable for(More)
A detailed examination of evolving traffic characteristics, operator requirements, and network technology trends suggests a move away from nonblocking interconnects in data center networks (DCNs). As a result, recent efforts have advocated oversubscribed networks with the capability to adapt to traffic requirements on-demand. In this paper, we present the(More)
We present an experimental study of three school choice mechanisms. The Boston mechanism is influential in practice, while the two alternative mechanisms, the Gale-Shapley and Top Trading Cycles mechanisms , have superior theoretical properties in terms of incentives and efficiency. Consistent with theory, this study indicates a high preference manipulation(More)
Traffic anomalies such as failures and attacks are commonplace in today's network, and identifying them rapidly and accurately is critical for large network operators. The detection typically treats the traffic as a collection of flows that need to be examined for significant changes in traffic pattern (eg, volume, number of connections). However, as link(More)
Mobile malware threats have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile antimalware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Such an evaluation is important for not only measuring the available defense against mobile(More)
This is the rst systematic experimental study of the comparative performance of two incentive compatible mechanisms for public goods provision: the Basic Quadratic mechanism by Groves and Ledyard and the Paired-Diierence mechanism by W alker. Our experiments demonstrate that the performance of the Basic Quadratic mechanism under a high punishment parameter(More)
Today's smartphone application markets host an ever increasing number of applications. The sheer number of applications makes their review a daunting task. We propose AppsPlayground for Android, a framework that automates the analysis smartphone applications. AppsPlayground integrates multiple components comprising different detection and automatic(More)