Systems that interact with the user via natural language are in their infancy. As these systems mature and become more complex, it would be desirable for a system developer if the...
John Chen, Srinivas Bangalore, Owen Rambow, Marily...
In a secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the sec...
Abstract. We present a method based on informationtheoretic distances for measuring the information transfer efficiency of voltage to impulse encoders. In response to light pulses,...
Christopher J. Rozell, Don H. Johnson, Raymon M. G...
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
There is a growing demand for application-specific embedded processors in system-on-a-chip designs. Current tools and design methodologies often require designers to manually spec...
Armita Peymandoust, Laura Pozzi, Paolo Ienne, Giov...