Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
— A Quadrature Amplitude Modulation (QAM) resource allocation algorithm for Video on Demand (VoD) traffic is presented. Based on stream encoding rates and available system capaci...
Jiong Gong, David Reed, Terry Shaw, Daniel A. Viva...
The mortality related to cervical cancer can be substantially reduced through early detection and treatment. However, current detection techniques, such as Pap smear and colposcop...
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Safe programming languages encourage the development of dynamically extensible systems, such as extensible Web servers and mobile agent platforms. Although protection is of utmost...