Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
The JAVA CARD transaction mechanism can ensure that a sequence of statements either is executed to completion or is not executed at all. Transactions make verification of JAVA CARD...
As agile software development principles and methods are being adopted by large software product organizations it is important to understand the role of software entropy. That is,...
High Definition (HD) H.264/AVC video compression is the emerging necessity on nowadays home entertainment environment and so on. However, Although B-frame coding scheme provides ...
Efficient resource allocation in cellular OFDMA systems envisages the assignment of the number of subcarriers and the relative transmission format on the basis of the experimented ...
Andrea Abrardo, Alessandro Alessio, Paolo Detti, M...