Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Many software systems are mixed-language systems today, i.e., they bind together components defined in different programming and specification languages. Analyses and refactorin...
In the context of a reconfigurable transport protocol, this paper introduces two protocol instances based on the composition and specialisation of the TFRC congestion control and...
Guillaume Jourjon, Emmanuel Lochin, Patrick S&eacu...
The concept of multi-hop CDMA cellular networks has been around for sometime now. It is a widely accepted assumption that using multi-hopping in cellular networks will increase th...
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...