In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
During the last few years there has been an increasing number of people-centric sensing projects, which combine location information with other sensors available on mobile devices,...
Exploring large virtual environments using a small haptic device with limited-workspace capabilities is a challenging task because the user very quickly reaches the borders of the...
The finite element method is applied to generate primitives that build continuous deformable shapes designed to support a new free-form modeling paradigm. The primitives autonomou...