The ability to fly at low altitude while actively avoiding collisions with the terrain and other objects is a great challenge for small unmanned aircraft. This paper builds on top ...
Jean-Christophe Zufferey, Antoine Beyeler, Dario F...
Abstract. In the field of Security, process equivalences have been used to characterize various information-hiding properties (for instance secrecy, anonymity and non-interference)...
Dynamic spectrum access networks are designed to allow today's bandwidth hungry "secondary devices" to share spectrum allocated to legacy devices, or "primary ...
Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haita...
The Internet topology data collected through traceroute exploration has been extensively studied in the past. In particular, a remarkable property of the Internet, the power-law s...
Information hiding is a general concept which refers to the goal of preventing an adversary to infer secret information from the observables. Anonymity and Information Flow are exa...