Realistic, complex, outdoor environments pose significant challenges for node localization in Wireless Sensor Networks. In spite of the fact that many elegant and clever solutions...
We describe a fractional-step numerical procedure for the simulation of immiscible three-phase flow in heterogeneous porous media that takes into account capillary pressure and ap...
Eduardo Abreu, J. Douglas, Frederico Furtado, D. M...
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Network traffic statistics show that, because shorter packets predominate in many applications, headers impose a considerable overhead. But the header content is largely repetitiv...