This paper proposes different low-cost coprocessors for public key authentication on 8-bit smart cards. Elliptic curve cryptography is used for its efficiency per bit of key and ...
Guerric Meurice de Dormale, Renaud Ambroise, David...
Computer based clinical guidelines have been developed to help caregivers in practicing medicine. GLIF3 (Guideline Interchange Format 3) is one of several standards that specify t...
Sensor devices are becoming ubiquitous, especially in measurement and monitoring applications. Because of the real-time, append-only and semi-infinite natures of the generated se...
Mohamed G. Elfeky, Walid G. Aref, Ahmed K. Elmagar...
— The main role of rate control in video coding is to handle a trade-off between a bandwidth limit and a video quality. In the low-delay video communication systems, its responsi...
Analysis of the spacial structure of proteins including folding processes is a challenge for modern bioinformatics. Due to limited experimental access to folding processes, comput...
Sebastian Potzsch, Gerik Scheuermann, Peter F. Sta...