A new challenge in scientific computing is to merge existing simulation models to create new higher fidelity combined (often multi-level) models. While this challenge has been a...
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of assess. In this paper, we propose the method to prote...
Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized o...
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...
Activity theory is based on the concept of tools mediating between subjects and objects. In this theory, an individual's creative interaction with his or her surroundings can ...
Morten Fjeld, Kristina Lauche, Martin Bichsel, Fre...