This paper proposes a content-aware authentication scheme optimized to account for distortion and overhead for media streaming. When authenticated media is streamed over a lossy n...
Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G....
— This paper introduces a novel robot which can run on the surface of water in a manner similar to basilisk lizards. Previous studies on the lizards themselves have characterized...
Steven Floyd, Terence Keegan, John Palmisano, Meti...
Abstract. Design by contract is a well known theory that views software construction as based on contracts between clients (callers) and suppliers (routines), relying on mutual obl...
babilistic Chemical Abstract Machine and the Expressiveness of Linda Languages Alessandra Di Pierro1 , Chris Hankin2 , and Herbert Wiklicky2 1 Dipartimento di Informatica, Universi...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...