There has been excellent progress on languages for rigorously describing key exchange protocols and techniques for proving that the network security tunnels they establish preserv...
The current effort to extend the power of information systems by making use of the semantics associated with terms and structures has resulted in a need to establish correspondenc...
Domenico Beneventano, Sabina El Haoum, Daniele Mon...
—Recent Advances in Distributed Source Coding (DSC) for mission-driven Wireless Sensor Networks (WSN) are related to the coding for multiple correlated sensors in applications su...
Honggang Wang, Dongming Peng, Wei Wang 0015, Hamid...
—The occurrence of a traffic anomaly is always responsible for a degradation of performance. The anomaly can be observable, at some scale, in different ways: an increase in the n...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
Estimating missing sensor values is an inherent problem in sensor network applications; however, existing data estimation approaches do not apply well to the context of datastream...