Abstract--The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to expl...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
Abstract. The paper introduces a new proof-number (PN) search algorithm, called PDS-PN. It is a two-level search, which performs at the first level a depth-first Proof-number and D...
Mark H. M. Winands, Jos W. H. M. Uiterwijk, H. Jaa...
Abstract. We introduce a new mobile transaction model applicable to decisionmaking applications over aggregate data warehoused on mobile hosts. The model allows the aggregate data ...
Abstract. This paper describes an approach to providing object persistence in object-oriented programming languages without modifying the run-time system or the language itself. By...
Abstract. The class of systems of uniform recurrence equations (UREs) is closed under unimodular transformations. As a result, every systolic array described by a unimodular mappin...