An approach for mining repositories of web-based user documentation for patterns of evolutionary change in the context of internationalization and localization is presented. Sets ...
Recent research has demonstrated the vulnerability of certain smart card architectures to power and electromagnetic analysis when multiplier operations are insufficiently shielde...
This paper presents a geometric error concealment scheme for DCT-based image/video data based on the Bezier polynomials (BP). The proposed scheme makes use of the average edge dir...
Sensor networks consist of multiple low-cost, autonomous, ad-hoc sensors, that periodically probe and react to the environment and communicate with other sensors or devices. A prim...
As the family of Alpha microprocessors continues to scale into more advanced technologies with very high frequency edge rates and multiple layers of interconnect, the issue of cha...