In this paper we introduce the idea of snapshot queries for energy efficient data acquisition in sensor networks. Network nodes generate models of their surrounding environment th...
Breakpoints are perhaps the quintessential feature of a debugger: they allow a developer to stop time and study the program state. Breakpoints are typically specified by selectin...
— An anti-collusion fingerprinting system is developed to protect media files against time-varying collusion attacks based on the scalar Costa scheme (SCS) and colluder weight ...
— In order to provide Dedicated Short Range Communication (DSRC) for future vehicle-to-vehicle (V2V) communication the IEEE is currently working on the IEEE 802.11p Wireless Acce...
This paper improves the Finiasz-Vaudenay construction of TCHo, a hardware-oriented public-key cryptosystem, whose security relies on the hardness of finding a low-weight multiple ...