Preventing abusive resource consumption is indispensable for all kinds of systems that execute untrusted mobile code, such as mobile object systems, extensible web servers, and we...
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which lead...
The need of developing a new software engineering process (SEP) that could allow the quick prototyping of some robotic applications and meet the requests coming from some companie...
— Solid tumors must recruit new blood vessels for growth and maintenance. Discovering drugs that block this tumor-induced development of new blood vessels (angiogenesis) is an im...
Arthur W. Mahoney, Brian G. Smith, Nicholas S. Fla...