Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Today information can be accessed from the Internet using a variety of devices and via different types of networks. With such diversity, it is impossible for a server on the Inter...
In this paper we present a design for IEEE 1149.1 Test Access Port (TAP)controllers that is based on a practical reuse methodology. While the basic use and core functionality of T...
Although employees’ expertise has long been regarded as an important asset in organizations at least on a par with capital, goods and documented information, it is only recently...
This paper discusses the memory interface of custom computing machines. We present a high speed parallel memory for the MoM-PDA machine, which is based on the Xputer paradigm. The ...
Reiner W. Hartenstein, Michael Herz, Thomas Hoffma...