The design of a class hierarchy may be imperfect. For example, a class C may contain a member m not accessed in any C-instance, an indication that m could be eliminated, or moved ...
In this paper, we consider a packet scheduler exploiting multiuser diversity in a wireless network with AMC (Adaptive Modulation and Coding), and propose a packet level performance...
This paper provides a comprehensive analysis of the working and requirements of fuzzy systems with the view to devise appropriate visualisation framework and techniques for these ...
The RC4 stream cipher is the most widely used software based stream cipher. It is based on a secret internal state of N = 256 bytes and two pointers. This paper proposes an efficie...
The relationship between the error propagation effect and the hypothesis coef?cients of the multi-hypothesis motion compensated prediction (MHMCP) is analyzed in this work. MHMCP ...