In this paper we show how to simulate attacks on authentication protocols in a realistic environment. The attack on the Needham-Schroeder public key protocol found by Gavin Lowe i...
Today’s software does not come with meaningful guarantees. This position paper explores why this is the case, suggests societal and technical impediments to more dependable softw...
Abstract. This article describes our implementation in Answer Set Programming of a reasoning system that models the flow of lava in volcanic eruptions. Our system can be employed i...
Isabella Cattinelli, Maria Luisa Damiani, Andrea N...
The techniques for video format conversion recently have reached a maturity, where they no longer prohibit application in the consumer domain because of high price or clear pictur...
—Underwater mobile acoustic sensor networks are promising tools for the exploration of the oceans. These networks require new robust solutions for fundamental issues such as: loc...
Antonio Caruso, Francesco Paparella, Luiz Filipe M...