We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
Abstract— We present a method for performing mode classification of real-time streams of GPS surface position data. Our approach has two parts: an algorithm for robust, unconstr...
Robert Granat, Galip Aydin, Marlon E. Pierce, Zhig...
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
IMT-2000 has been developing in both cdma2000 and W-CDMA, and their convergence or harmonization has also been discussed in several standard organizations. Besides the most expert...