Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Java applets run on a Virtual Machine that checks code's integrity and correctness before execution using a module called Bytecode Verifier. Java Card technology allows Java ...
- Software agents have been already introduced successfully in the scope of embedded technology as smart controllers of intelligent systems. This paper presents a further applicati...
SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow computing power from a server (e.g., an untrustworthy auxiliary device like an ATM) witho...
Heeyoul Kim, Younho Lee, Seong-Min Hong, Hyunsoo Y...
In this paper, Constrained Least Mean Square (CLMS) algorithm for narrowband adaptive beamforming for tracking mobile user in a 2D urban environment has been used. This algorithm i...