Abstract—As the number of wireless sensor network applications continues to grow, the need for specialized task scheduling mechanisms, aware of the sensor devices’ capabilities...
Tim De Pauw, Stijn Verstichel, Bruno Volckaert, Fi...
Abstract User-centered design is often performed without regard to individual user differences. In this paper, we report results of an empirical study aimed to evaluate whether com...
Elena V. Zudilova-Seinstra, Boris W. van Schooten,...
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
Abstract. Virtual environments (VEs) can be used to study issues related to human navigation, such as spatial knowledge acquisition. In our prior work, we introduced a new locomoti...
Ji-Sun Kim, Denis Gracanin, Kresimir Matkovic, Fra...