Conventional tracking approaches assume proximity in space, time and appearance of objects in successive observations. However, observations of objects are often widely separated ...
Many applications require detecting structural changes in a scene over a period of time. Comparing intensity values of successive images is not effective as such changes don'...
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
In the context of FPGAs, system downgrade consists in preventing the update of the hardware configuration or in replaying an old bitstream. The objective can be to preclude a syst...
Recent work in mobile ad hoc networks, simply MANETs, has drawn attention to the mobility capability of each node. In [5], it is proved that the optimal positions of the relay nod...