Future microprocessors will be highly susceptible to transient errors as the sizes of transistors decrease due to CMOS scaling. Prior techniques advocated full scale structural or...
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
Reversible or lossless data hiding enables host media to be restored from marked media without any loss of host information. However, since most of existing lossless data hiding m...
Kyung-Su Kim, Min-Jeong Lee, Young-Ho Suh, Heung-K...
In this paper, we describe a method to enhance the readability of out-of-vocabulary items (OOVs) in the textual output in a large vocabulary continuous speech recognition system. ...
Bart Decadt, Jacques Duchateau, Walter Daelemans, ...
In this paper, we describe a novel localization algorithm for ad hoc wireless sensor networks. Accurate selforganization and localization capability is a highly desirable character...