: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Abstract. STP is a decision procedure for the satisfiability of quantifier-free formulas in the theory of bit-vectors and arrays that has been optimized for large problems encoun...
The design of a large component-based software system typically involves the composition of different components. Instead of relying on a free composition of components, we advoca...
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...
This paper describes the development and application of methods to integrate research image analysis methods and software with a commercial image guided surgery navigation system ...
Xenophon Papademetris, Kenneth P. Vives, Marcello ...