We present a new technique for verifying correspondences in security protocols. In particular, correspondences can be used to formalize authentication. Our technique is fully auto...
Abstract. The study of graph vertex colorability from an algebraic perspective has introduced novel techniques and algorithms into the field. For instance, it is known that k-color...
Abstract Level set methods have been used in a great number of applications in R2 and R3 and it is natural to consider extending some of these methods to problems defined on surfac...
Abstract--In this paper we present a GLRT-based adaptive detection algorithm for extended targets with improved rejection capabilities of mismatched signals. We assume that a set o...
Francesco Bandiera, Olivier Besson, Giuseppe Ricci
Abstract— We present an algorithm for collision-free navigation of multiple flying robots in three-dimensional workspace. Our approach extends the model of a simple car to a sim...