Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
The existence of supermassive black holes lurking in the centers of galaxies and of stellar binary systems containing a black hole with a few solar masses has been established bey...
Stephan Rosswog, Enrico Ramirez-Ruiz, W. Raphael H...
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Abstract Mobile robot vision-based navigation has been the source of countless research contributions, from the domains of both vision and control. Vision is becoming more and more...
Francisco Bonin-Font, Alberto Ortiz, Gabriel Olive...
Abstract--This paper presents an end-to-end reservation protocol for quality-of-service (QoS) support in the medium access control layer of wireless multihop mesh networks. It rese...
E. Carlson, Christian Prehofer, Christian Bettstet...