Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We prop...
Graph theory has been used to characterize the solvability of the sensor network localization problem. If sensors correspond to vertices and edges correspond to sensor pairs betwee...
Brian D. O. Anderson, Iman Shames, Guoqiang Mao, B...
In this paper I describe a formal semantics for iconic spatial gestures. My claim is that the meaning of iconic gestures can be captured with an appropriate mathematical theory of ...
On the fly synthesis of mediators is a revolutionary approach to the seamless networking of today’s and future digital systems that increasingly need be connected. The resulting...
A system making optimal use of available information in incremental language comprehension might be expected to use linguistic knowledge together with current input to revise beli...