Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
emsintovirtualenvironments,whileabstracting the modeling process as much as possible. To achieve efficiency,weconcentrateoncullingdynamicalsystems: if the system is not in view, we...
Stephen Chenney, Jeffrey Ichnowski, David A. Forsy...
Abstract--A novel fully comprehensive mobile video communications system is proposed in this paper. This system exploits the useful rate management features of the video transcoder...
Safak Dogan, Akin Cellatoglu, Mustafa Uyguroglu, A...
: In the recent years, the notion of `digital divide' has been widely researched, and has attracted much debate and speculation for its economic, social and political conseque...
Abstract--This paper proposes spectral efficient relayassisted transmit diversity techniques, i.e., space-time and space-frequency block codes (STBC/SFBC), for single carrier frequ...