— To support dynamic traffic-asymmetry property in future wireless communication systems, we propose a hybridTDD scheme, combination of static-TDD and dynamic-TDD. By using adap...
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if the adversary can learn the value of a secret parameter. In the second version,...
The paper presents a novel strategy aimed at modelling instruction energy consumption of 32-bits microprocessors. Differently from former approaches, the proposed instruction-level...
Carlo Brandolese, Fabio Salice, William Fornaciari...
One of the most challenging tasks a programmer can face is attempting to analyse and understand a legacy assembler system. Many features of assembler make analysis difficult, and ...
This paper shows how to verify a Multi-Agent System specification using human organization metaphors. This proposal applies Activity Theory, which has its roots in Sociology, to st...