Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Next-generation mobile terminals are expected to provide users with seamless, uninterrupted network connectivity while moving across wide geographic locations. Achieving continuou...
In many computer systems with large data computations, the delay of memory access is one of the major performance bottlenecks. In this paper, we propose an enhanced field remappi...
Keoncheol Shin, Jungeun Kim, Seonggun Kim, Hwansoo...
— This paper proposes two frequency offset estimation algorithms for the uplink of an Interleaved Frequency-Division Multiple-Access (IFDMA) system. One algorithm performs estima...
Abstract— In this paper, we propose asynchronous non-orthogonal communication between distributed sensors and a data fusion center via asynchronous direct-sequence code-division ...
Justin S. Dyer, Balasubramaniam Natarajan, Sudharm...