In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
When looking for federal statistics, finding the right table, chart or report can be a daunting task for anyone not thoroughly familiar with the federal statistical system. Search...
In this paper the philosophical concept of authenticity is used as a framing device for providing an interpretation of aspects of both ethical and practical action on the part of i...
The vision of pervasive or ubiquitous computing, conceived by Mark Weiser, foresees a world where computing is embedded in every day objects. Such objects interact with each other...
Abstract— Spectrum-overlay scenarios for wideband multicarrier (MC) systems bring new technical challenges that must be considered during the system design. In such a scenario, t...
Mohamed Marey, Mamoun Guenach, Frederik Simoens, H...