Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat ...
V. T. Lam, Spyros Antonatos, Periklis Akritidis, K...
—The differential encoding/decoding setup introduced by Kiran et al, Oggier-Hassibi and Jing-Jafarkhani for wireless relay networks that use codebooks consisting of unitary matri...
We propose a comprehensive theoretical framework to evaluate reliability and energy consumption of distributed source coding (DSC) in wireless sensor networks (WSNs) applications. ...
Carlo Fischione, Stefano Tennina, Fortunato Santuc...
This paper describes, and evaluates benefits of, a design methodology to translate certain mathematical models into the design of novel, self-adaptive, peer-to-peer (p2p) distrib...
Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols – whom we meet, or what we say or do – chea...