Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
Previous theoretical work has shown that a single layer neural network can implement the optimal decision process for simple, two alternative forced choice (2AFC) tasks. However, ...
Eric Shea-Brown, Mark S. Gilzenrat, Jonathan D. Co...
Bursty traffic is dominant in modern communication networks and keeps the call-level QoS assessment an open issue. ON-OFF traffic models are commonly used to describe bursty tra...
Ioannis D. Moscholios, Michael D. Logothetis, Mich...
In automatic guidance of agriculture vehicles, lateral control is not the only requirement. Much research work has been focused on trajectory tracking control which can provide hi...
Hao Fang, Ruixia Fan, Benoit Thuilot, Philippe Mar...
Several peer-to-peer systems for live streaming have been recently deployed (e.g. CoolStreaming, PPLive, SopCast). These all rely on distributed, epidemic-style dissemination mech...