Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Abstract. Stochastic model checking is a recent extension of traditional modelchecking techniques for the integrated analysis of both qualitative and quantitative system properties...
Abstract. In the last few years, the microprocessors technologies have been definitely moving to multi-core architectures, in order to improve performances as well as reduce power ...
Triangle inequality violations (TIVs) are important for latency sensitive distributed applications. On one hand, they can expose opportunities to improve network routing by findi...
Cristian Lumezanu, Randolph Baden, Neil Spring, Bo...
With presumptions that e-government theories prevail in various formats and concepts around the globe, nations and institutions, not many examples are there to emulate in terms of...