Abstract. Pseudonymization is sometimes used as a light-weight alternative to fully cryptographic solutions, when information from different data sources needs to be linked in a p...
A social network can become bases for information infrastructure in the future. It is important to extract social networks that are not biased. Providing a simple means for users ...
—Opportunistic networks represent one of the most interesting evolution of MANET paradigm. Generally speaking, opportunistic networks enable user communication in environments wh...
In recent years, it has been reported that several existing networks including the Internet have scale-free structure. In this paper, through a simple numerical analysis, we inves...
Testing of high density SoCs operating at high clock speeds is an important but difficult problem. Many faults, like delay faults, in such sub-micron chips may only appear when th...
Tomas Bengtsson, Artur Jutman, Shashi Kumar, Raimu...