It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
An extension of single-view scalable video coding to multiview is presented in this paper. Scalable video coding is recently developed in the Joint Video Team of ISO/IEC MPEG and ...
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...