This paper describes an approach to interoperability in design projects that is based on computational agents customizing the representation of product data to individual design to...
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if the adversary can learn the value of a secret parameter. In the second version,...
A multiband OFDM transmitter and receiver are presented for underwater communications at low SNR. Compared with a single-band OFDM scheme, the multiband approach leads to a conside...
In this paper, we introduce a novel medium access control (MAC) protocol for Radio Frequency Identification (RFID) systems. This protocol exploits the Markov Chain Model of Slotted...
Tracking of mobile targets is an important application of sensor networks. This is a non-trivial problem as the increased accuracy of tracking results in an overall reduction in th...