This paper deals with the routing in cognitive mobile ad hoc networks. We propose to modify the widely adopted Ad-hoc On-demand Distance Vector (AODV) protocol [1] in order to assu...
Angela Sara Cacciapuoti, Cosimo Calcagno, Marcello...
Abstract-- Vision-based control of a robot formation is challenging because the on-board sensor (camera) only provides the view-angle to the other moving robots, but not the distan...
Gian Luca Mariottini, Simone Martini, Magnus Egers...
Abstract. Graph cuts has emerged as a preferred method to solve a class of energy minimization problems in computer vision. It has been shown that graph cut algorithms designed kee...
Chetan Arora, Subhashis Banerjee, Prem Kalra, S. N...
Analyzing Border Gateway Protocol (BGP) instances is a crucial step in the design and implementation of safe BGP systems. Today, the analysis is a manual and tedious process. Resea...
Anduo Wang, Carolyn L. Talcott, Limin Jia, Boon Th...
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...