Abstract. Given a basis of a vector space V over a field K and a multiplication table which defines a bilinear map on V , we develop a computer program on Mathematica which checks ...
The chaotic dynamics of fractional-order systems has attracted much attention recently. Chaotic synchronization of fractional-order systems is further studied in this paper. We inv...
Zaid M. Odibat, Nathalie Corson, M. A. Aziz-Alaoui...
In this paper syndrome former trellis construction for punctured convolutional codes (PCCs) is discussed. The class of (np - 1)/np-rate PCCs derived from 1/n-rate mother codes is c...
Abstract. Currently knownbasic anonymitytechniques dependon identity verication. If verication of user identities is not possible due to the related management overhead or a gene...
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing ...
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons