We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our imp...
The demand for real-time data services has been increasing recently. Many e-commerce applications and webbased information services are becoming very sophisticated in their data n...
— This paper deals with output feedback impulse control under set-membership uncertainty where the control realization consists of a sequence of δ-impulses. It indicates solutio...
Alexander N. Daryin, Irina A. Digailova, Alexander...
—Mind maps are used by millions of people. In this paper we present how information retrieval on mind maps could be used to enhance expert search, document summarization, keyword...
This special session will proved information about the status of work related to Masters programs in Computing. Specifically, the session will describe work completed in the follo...
Gordon Davies, Lillian N. Cassel, Arthur B. Pyster...