In this paper we address the need to characterize and quantify resource usage in IEEE 802.11 WLANs in order to support radio resource management. We present a compact and intuitiv...
Software archives contain historical information about the development process of a software system. Using data mining techniques rules can be extracted from these archives. In th...
The computational fundament of most public-key cryptosystems is the modular multiplication. Improving the efficiency of the modular multiplication is directly associated with the...
David Narh Amanor, Viktor Bunimov, Christof Paar, ...
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Abstract. The main goal of this paper is to apply rewriting termination technology —enjoying a quite mature set of termination results and tools— to the problem of proving auto...