—The key idea of dynamic spectrum access (DSA) networks is to allow the secondary, unlicensed users to detect and use unused portions of the spectrum (white spaces) opportunistic...
Abstract. Ada has proved to be one of the best languages to learn computer programming. Nevertheless, learning to program is difficult and when it is combined with lack of motivati...
We describe a simple iterative method for proving a variety of results in combinatorial optimization. It is inspired by Jain’s iterative rounding method (FOCS 1998) for designing...
—In the framework of the European Integrated Project PALETTE, the École Polytechnique Fédérale de Lausanne (EPFL) is developing the eLogbook Web 2.0 social software. The purpo...
Denis Gillet, Sandy El Helou, Chiu-Man Yu, Christo...
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...