Learn More
OceanStore is a utility infrastructure designed to span the globe and provide continuous access to persistent information. Since this infrastructure is comprised of untrusted servers, data is protected through redundancy and cryptographic techniques. To improve performance, data is allowed to be cached anywhere, anytime. Additionally, monitoring of usage(More)
Traffic anomalies such as failures and attacks are commonplace in today's network, and identifying them rapidly and accurately is critical for large network operators. The detection typically treats the traffic as a collection of flows that need to be examined for significant changes in traffic pattern (eg, volume, number of connections). However, as link(More)
Zero-day polymorphic worms pose a serious threat to the security of Internet infrastructures. Given their rapid propagation, it is crucial to detect them at edge networks and automatically generate signatures in the early stages of infection. Most existing approaches for automatic signature generation need host information and are thus not applicable for(More)
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective tools for executing spam campaigns and spreading malware. Intuitively, a user is more likely to respond to a message from a Facebook friend than from a stranger, thus making(More)
Traditional design of mobile wireless networks mainly focuses on ubiquitous access and large capacity. However, as energy saving and environmental protection become a global demand and inevitable trend, wireless researchers and engineers need to shift their focus to energy-efficiency oriented design, that is, green radio. In this paper, we propose a(More)
Mobile malware threats have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile antimalware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Such an evaluation is important for not only measuring the available defense against mobile(More)
Overlay network monitoring enables distributed Internet applications to detect and recover from path outages and periods of degraded performance within seconds. For an overlay network with <i>n</i> end hosts, existing systems either require <i>O</i>(<i>n</i><sup>2</sup>) measurements, and thus lack scalability, or can only estimate the latency but not(More)
We design a field experiment to explore the use of social comparison to increase contributions to an online community. We find that, after receiving behavioral information about the median user’s total number of movie ratings, users below the median demonstrate a 530% increase in the number of monthly movie ratings, while those above the median do not(More)
Today's smartphone application markets host an ever increasing number of applications. The sheer number of applications makes their review a daunting task. We propose AppsPlayground for Android, a framework that automates the analysis smartphone applications. AppsPlayground integrates multiple components comprising different detection and automatic(More)
Jasmonates (JAs) mediate plant responses to insect attack, wounding, pathogen infection, stress, and UV damage and regulate plant fertility, anthocyanin accumulation, trichome formation, and many other plant developmental processes. Arabidopsis thaliana Jasmonate ZIM-domain (JAZ) proteins, substrates of the CORONATINE INSENSITIVE1 (COI1)-based SCF(COI1)(More)