In recent years the scientific journal market faces significant evolutions that may cause major changes in the way of publishing research results. In this connection, open access ...
Methods in object-oriented concurrent libraries hide internal synchronization details. However, information hiding may result in clients causing thread safety violations by invoki...
Jyotirmoy V. Deshmukh, E. Allen Emerson, Sriram Sa...
— This paper considers a network flow control problem where routing and input rates are controlled in a decentralized way across a network, to optimize a global welfare objectiv...
—A mobile robot can be a rather significant source of noise: noisy fans cool onboard computers, motors are spinning, rubber wheels are squeaking against the floor, and mechanical...
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...