An architecture and associated protocols are presented for managing multicast addresses and performing connection control for applications that use multicast communication faciliti...
Abstract. We present a strategy to develop, in a functional setting, correct, e cient and portable Divide-and-Conquer (DC) programs for massively parallel architectures. Starting f...
A mobile user location management mechanism is introduced that incorporates a distance based location update scheme and a paging mechanism that satises predened delay requiremen...
-This paper discusses the output control for a linear plant containing uncertain hysteresis nonlinearities in actuator and sensor devices simultaneously, where the hysteresis is de...
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts hav...