The earlier work on predicate detection has assumed that the given computation is finite. Detecting violation of a liveness predicate requires that the predicate be evaluated on a...
Abstract. Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all exi...
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Ar...
—IEEE 802.16 standard was designed to support the bandwidth demanding applications with quality of service (QoS). Bandwidth is reserved for each application to ensure the QoS. Fo...
In Smart Spaces (SSs), the capability of learning from experience is fundamental for autonomous adaptation to environmental changes and for proactive interaction with users. New re...
Alessio Dore, Andrea F. Cattoni, Carlo S. Regazzon...