Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
It is common for libraries to provide public access to historical and ancient document image collections. It is common for such document images to require specialized processing i...
The analysis, and eventual approval or rejection, of new enterprise information technology (IT) initiatives often proceeds on the basis of informal estimates of return on investme...
— Radiation dose calculation is an important step in the treatment of cancer patients requiring radiation therapy. It ensures that the physician prescribed dose agrees with the d...
Kevin Whitton, Xiaobo Sharon Hu, Cedric X. Yu, Dan...
Abstract— This paper presents an Interleaver-Division Multiple Access (IDMA) based architecture with single-user decoding using parallel concatenated non-linear trellis codes (PC...
Miguel Griot, Andres I. Vila Casado, Richard D. We...