For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
: A research topic that has been receiving much interest recently is the reconstruction of a high resolution image from an ensemble of low resolution images of the same scene. Such...
—The synthesis of sound based on physical models of 2-D percussion instruments is problematic and has been approached only infrequently in the literature. Beyond the computationa...
The volume of higher priority Internet applications is increasing as the Internet continues to evolve. Customers require Quality of Service (QoS) guarantees with not only guarante...
Mina Amin, Kin-Hon Ho, George Pavlou, Michael P. H...
This paper presents ReVive, a novel general-purpose rollback recovery mechanism for shared-memory multiprocessors. ReVive carefully balances the conflicting requirements of avail...