Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Abstract—This paper proposes a new scheme based on information theoretical criteria to estimate the Channel-ImpulseResponse (CIR) length, whose accurate estimate represents one o...
Ali Aassie Ali, Van-Duc Nguyen, Kyandoghere Kyamak...
In this paper we present a randomized complexity theoretic model for those epidemics propagated via short-distance close contact. We prove that the contact-based epidemics problems...
Nowadays, robots have to face very complex tasks, often requiring collaboration between several individuals. As a consequence, robotics can be considered one of the most suitable ...
Antonio Chella, Massimo Cossentino, Ignazio Infant...
This paper illustrates the development of an approximate analytical model for a communication network providing integrated services to a population of mobile users, and presents p...
Marco Ajmone Marsan, Salvatore Marano, Carlo Mastr...