In this work, we investigate secret key generation from channel states. We point out, by means of a packet-delaybased attack, that observing its own channel states is not the only ...
This study addresses the general problem of efficient resource management in wireless networks with arbitrary timevarying topologies. Communication channels are assumed to generall...
Abstract. Audition and touch endow spectral processing abilities allowing texture recognition and discrimination. Rat whiskers sensorisystem exhibits, as the cochlea, resonance pro...
Mathieu Bernard, Steve N'Guyen, Patrick Pirim, Agn...
Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications bas...
Maria Maleshkova, Carlos Pedrinaci, John Domingue,...
Keyword queries over structured databases are notoriously ambiguous. No single interpretation of a keyword query can satisfy all users, and multiple interpretations may yield over...
Elena Demidova, Peter Fankhauser, Xuan Zhou, Wolfg...