—Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, we first identify a typical attacker, c...
Panagiotis Papadimitratos, Jun Luo, Jean-Pierre Hu...
: Although RFID is mainly used to identify objects whose data can then be accessed over the network, passive HF RFID tags do have significant data storage capacity (up to 4K), whic...
We consider two nodes equipped with multiple antennas that intend to communicate i.e. both of which transmit and receive data. We model the responses of the communication channels...
Abstract. The today's applications usually form a system of sub-applications, each being responsible for a particular functionality. Hence, the design and maintenance of such ...
Relational database systems have been the dominating technology to manage and analyze large data warehouses. Moreover, the ER model, the standard in database design, has a close r...
Carlos Ordonez, Il-Yeol Song, Carlos Garcia-Alvara...