We present a calculus for establishing non-interference of several Java threads running in parallel. The proof system is built atop an implemented sequential Java Dynamic Logic cal...
If we abstract a sensor network as a network graph consisting of vertices and edges, where vertices represent sensor nodes and edges represent distance measurements between neighbo...
Abstract Sensor devices produce data that are unreliable, low-level, and seldom able to be used directly by applications. In this paper, we propose Metaphysical Data Independence (...
Shawn R. Jeffery, Michael J. Franklin, Minos N. Ga...
Using directional antennas in wireless ad hoc networks is an attractive issue due to its potential advantages such as spatial reuse, low power consumption and low chance of interfe...
Abstract. In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris ...
Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Ferna...