Gossip-based epidemic protocols are used to aggregate data in distributed systems. This fault-tolerant approach does neither require maintenance of any global network state nor kno...
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...
: The performance potential of multistatic sonar operations has been investigated by several research institutes and proven in numerous international sea trials during the last yea...
Distributing power and ground to a vertically integrated system is a complex and difficult task. Interplane communication and power delivery are achieved by through silicon vias (...