Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Cellular automata are a simple model of parallel computation. Many people wonder about the computing power of such a model. Following an idea of S. Wolfram [16], M. Cook [3] has pr...
The existing TCP (Transmission Control Protocol) is known to be unsuitable for a network with the characteristics of high BDP (Bandwidth-Delay Product) because of the fixed small o...
Gi-chul Yoo, Eun-sook Sim, Dongkyun Kim, Taeyoung ...
Due to military drawdowns and the need for additional transportation lift requirements, the US MARINE CORPS developed a concept wherein they had modified a commercial container sh...
We have developed a sales support system for door-todoor sales of cosmetics based on a skin-image grading system called Skin-CRM (Skin Customer Relationship Management). Our Skin-...