—Many application-specific architectures provide indirect addressing modes with auto-increment/decrement arithmetic. Since these architectures generally do not feature an indexe...
The display of space filling data is still a challenge for the community of visualization. Direct Volume Rendering (DVR) is one of the most important techniques developed to achie...
Christian Boucheny, Georges-Pierre Bonneau, Jacque...
We study the impact of the shape of optical filters on the bit error rate (BER) of a multi-channel spectrum-sliced wavelength division multiplexed (SS-WDM) system, incorporating no...
Amirhossein Ghazisaeidi, Francesco Vacondio, Lesli...
Binary finite fields GF(2n ) are very commonly used in cryptography, particularly in publickey algorithms such as Elliptic Curve Cryptography (ECC). On word-oriented programmable ...
The Agent-Community-based Peer-to-Peer Information Retrieval (ACP2P) method uses agent communities to manage and look up information of interest to users. An agent works as a dele...