Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
This paper presents a set of algorithms for efficiently evaluating join queries over static data tables in sensor networks. We describe and evaluate three algorithms that take adv...
An in-circuit diagnostic test structure triggered by a light pulse captures logic states on-chip with picosecond timing accuracy, and the results read out via a scan chain thus pr...
We suggest that a combination of randomization and gossip communication can be used to overcome scalability barriers that limit the utility of many technologies for distributed sys...
Learning to predict rare events from sequences of events with categorical features is an important, real-world, problem that existing statistical and machine learning methods are ...