A set of presentations that cover the book, which includes several topics such as relational database systems such as Relational Databases, Database Design, Object-Based Databases ...
This paper discusses issues related with learning resources brokerage systems. It introduces a market-based modeling approach and proposes a virtual market model design of a broke...
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...
This paper develops analytic models that characterize the behavior of on-demand stored media content delivery using BitTorrent-like protocols. The models capture the effects of di...
Nadim Parvez, Carey L. Williamson, Anirban Mahanti...
To date, sensitivity, bifurcation and singularity analysis have been employed to identify and characterize the qualitative nonlinear behaviour of chemical process systems. The phe...