In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
—Computation of the undetected error probability for error correcting codes over the Z-channel is an important issue, explored only in part in previous literature. In this paper ...
Franco Chiaraluce, Marco Baldi, Susanna Spinsante,...
Specification of monitored context properties and their influence on behavior of Web services and management activities is a prerequisite for contextsensitive operation, which is ...
We explicit the link between the computer arithmetic problem of providing correctly rounded algebraic functions and some diophantine approximation issues. This allows to get bounds...
After stability, transparency is the major issue in the design of a telemanipulation system. In this paper, we exploit the behavioral approach in order to provide an index for the ...