We present DCL-PC: a logic for reasoning about how the abilities of agents and coalitions of agents are altered by transferring control from one agent to another. The logical foun...
Wiebe van der Hoek, Dirk Walther, Michael Wooldrid...
—We study the optimum location of an eavesdropper from a secrecy capacity perspective in multiterminal networks with power control. We determine the logical location of an eavesd...
In this demonstration, we are going to illustrate how to use a mobile camera to redirect documents to various devices connected to the same network. Categories and Subject Descrip...
– MBMS bearer services can be provided in each cell by either Point-to-Point (one Dedicated channel for each User Equipment (UE)) or Point-to-Multipoint (one Common channel share...
Andreas Panayides, Christophoros Christophorou, Jo...
The Session Initiation Protocol (SIP) has been widely adopted for Instant Messaging (IM) and VoIP telephony both by the enterprise and in service provider systems. Till now, SIP f...
Arup Acharya, Stefan Berger, Chandrasekhar Narayan...