: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Word Sense Disambiguation (WSD), in the field of Natural Language Processing (NLP), consists in assigning the correct sense (semantics) to a word form (lexeme) by means of the cont...
Davide Buscaldi, Giovanna Guerrini, Marco Mesiti, ...
: In this paper we describe the Iso-phone, a telecommunications concept providing a service that can be described simply as a meeting of the telephone and the floatation tank. By b...
In this paper we present a genetic approach for the efficient generation of an encoder to minimize switching activity on the high-capacity lines of a communication bus. The appro...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...
The next generation of mobile networks will utilise multiple radio access technologies. These heterogeneous wireless networks will enable the user to seamlessly roam between the d...
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
As computers become ubiquitous in our every day lives, providing a means for true user empowerment will become crucial. Techniques which allow dynamic reuse and composition of exi...
Wideband CDMA systems with orthogonal spreading codes suffer severely due to the loss of orthogonality by multipath propagation. This yields Multiple Access Interference (MAI) wh...
The Web Services Framework provides techniques to enable the application-toapplication use of the Web. It has the potential of becoming the core of a new Web-based middleware plat...