Abstract. Computer manipulated social networks are usually built from the explicit assertion by users that they have some relation with other users or by the implicit evidence of s...
This work presents a study about the use of Laban Movement Analysis (LMA) as a robust tool to describe human basic behavior patterns, to be applied in human-machine interaction. LM...
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
We introduce a dynamic battery model that describes the variations of the capacity of a battery under time varying discharge current. This model supports a co-design approach for ...
— This paper aims to present ideas to bridge the gap between two conflicting views of information: Shannon information, which is used to model physical layer information, and se...