Abstract— An effective method is presented for position tracking of a moving mobile terminal (MT). The method is based on time/distance difference of arrival (TDOA) estimation an...
Wen Pan, Jiang Wu, Zhanjun Jiang, Yan Wang, Xiaohu...
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Abstract. In this paper we show how to extend a constructive type theory with a principle that captures the spirit of Markov’s principle from constructive recursive mathematics. ...
Refereed games are interactive proof systems with two competing provers: one that tries to convince the verifier to accept and another that tries to convince the verifier to rej...
Abstract. Query reformulation techniques based on semantic knowledge have been used in two ways in database management systems, namely for query optimization and for data integrati...