9 articles in this issue
Reza Ebrahimi Atani,Sattar Mirzakuchaki,Shahabaddin Ebrahimi Atani,Willi Meier
The threat of DPA attacks is of crucial importance when designing cryptographic hardware. This contribution discusses the DPA-resistant implementation of two eSTREAM finalists using SABL logic styles. Particularly, two Feedback Shift Register (FSR) based ... see more
Irina Georgescu
In this paper there are studied some numerical indicators which measure the degree to which a fuzzy relation verifies some properties (reflexivity, transitivity, etc. ).The main result is a fuzzy generalization of the Szpilrajn theorem in terms of such nu... see more
Yuxuan Ji,Hengtai Ma,Gang Zheng
Satellite networks are becoming increasingly important because of the exciting global communication services they provide. Key management policies have been successfully deployed in terrestrial networks to guarantee the information security. However, long... see more
Audrey Marchand,Maryline Chetto
In this paper, we deal with dynamic scheduling components integrating new Quality of Service (QoS) functionalities into a Linux-based real-time operating system. In our approach, periodic tasks allow occasional deadline violations within given bounds spec... see more
Sorin C. Negulescu,Claudiu V. Kifor,Constantin Oprean
Ant colonies are successfully used nowadays as multi-agent systems (MAS) to solve difficult optimization problems such as travelling salesman (TSP), quadratic assignment (QAP), vehicle routing (VRP), graph coloring and satisfiability problem. The objectiv... see more
Milan Stanojevic,Mirko Vujoševic,Bogdana Stanojevic
The number of efficient points in criteria space of multiple objective combinatorial optimization problems is considered in this paper. It is concluded that under certain assumptions, that number grows polynomially although the number of Pareto optimal so... see more
Leon ?âmbulea,Manuela Horvat-Petrescu
A distributed system database performance is strongly related to the fragment allocation in the nodes of the network. An heuristic algorithm for redistributing the fragments is proposed. The algorithm uses the statistical information relative to the reque... see more
Zhong Xu,Xue Liu,Guoqing Zhang,Wenbo He
Mobile Ad Hoc Network is a self-configurable and self-organizing wireless network of mobile devices without fixed infrastructure support, which makes it a good candidate as underlying communication network for the Cyber-Physical Systems in emergency condi... see more