—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...
Protractor 3D is a gesture recognizer that extends the 2D touch screen gesture recognizer Protractor [8] to 3D gestures. It inherits many of Protractor’s desirable properties, s...
Abstract. We study how primary tactile afferents encode relevant contact features to mediate early processing of haptic information. In this paper, we apply metrical information t...
Romain Brasselet, Roland S. Johansson, Angelo Arle...
—Patterns of human encounters, which are difficult to observe directly, are fundamental to the propagation of mobile malware aimed at infecting devices in spatial proximity. We ...
James Mitchell, Eamonn O'Neill, Gjergji Zyba, Geof...
Consider a completely asynchronous network consisting of n parties where every two parties are connected by a private channel. An adversary At with unbounded computing power activ...