The state of the art congestion control algorithms for wireless sensor networks respond to coarse-grained feedback regarding available capacity in the network with an additive inc...
A common client-side countermeasure against Cross Site Request Forgery (CSRF) is to strip session and authentication information from malicious requests. The difficulty however is ...
Philippe De Ryck, Lieven Desmet, Wouter Joosen, Fr...
Popular mobile code architectures (Java and .NET) include verifiers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
: Many geometric problems like generalized Voronoi diagrams, medial axis computations and boundary evaluation involve computation and manipulation of non-linear algebraic primitive...
Shankar Krishnan, Mark Foskey, Tim Culver, John Ke...
The growing popularity of hypertext navigation systems and the availability of large documentary databases is leading to the design of navigation systems that allow to explore the...
Frantz Vichot, Francis Wolinski, Joseph Tomeh, Syl...