Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this s...
Abstract. Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an adva...
Stephen E. McLaughlin, Dmitry Podkuiko, Patrick Mc...
The trustworthiness of any Public Key Infrastructure (PKI) rests upon the expectations for trust, and the degree to which those expectations are met. Policies, whether implicit as ...
In this paper, we propose an original optimization approach for reconstructing interface changes of a conductivity inclusion from measurements of eigenvalues and eigenvectors asso...
Habib Ammari, Elena Beretta, Elisa Francini, Hyeon...