Tools for analysing secure information flow are almost exclusively based on ideas going back to Denning’s work from the 70’s. This approach embodies an imperfect notion of sec...
In this study, the impact of mobility is investigated in low-speed environments such as femtocells and picocells for wireless networks. Given that there is interference on the upl...
—The EU WINNER projects have studied OFDM-based packet data systems beyond 3G that use adaptivity on all timescales to obtain high flexibility and performance. The adaptive trans...
The Lenstra-Lenstra-Lov´asz lattice basis reduction algorithm (LLL or L3 ) is a very popular tool in public-key cryptanalysis and in many other fields. Given an integer d-dimensi...
The interactive system which interacts human with computer has been recognized as one direction of computer development for a long time. For example, in cinema, a person gets info...