Foto 7

Elenco Pubblicazioni - Publications (1288)

The work analyses the cybersecurity weakness in state-of-artautomotive in-vehicle networks and discusses possible countermeasuresat architecture level. Due to stringent real-time constraints (throughputand latency) of fail-safe automotive applications, hardware acceleratorsare needed. A hardware accelerator design for…
Tenants in a cloud environment run services, such as Virtual Network Function instantiations, that may legitimately generate millions of packets per second. The hosting platform, hence, needs robust packet scheduling mechanisms that support these rates…
Chipless sensors are entirely passive devices whose electromagnetic signature is intelligible in time or frequency domain. The variations of the electromagnetic response of these devices can be used to sense environmental parameters at a very…
An extension of the Uniform Geometrical Theory of Diffraction (UTD) has been recently proposed to analyze Complex-Source Beam (CSB) diffraction by a perfectly electrically conducting (PEC) wedge. In the context of high-frequency techniques, the proposed…
Several projects deploy probes in the Internet. Probes are systems that continuously perform traceroutes and other networking measurements (e.g., ping) towards selected targets. Measurements can be stored and analyzed to gain knowledge on several aspects…