As IC technologies scale to finer feature sizes, it becomes increasingly difficult to control the relative process variations. The increasing fluctuations in manufacturing process...
Having reliable security in systems is of the utmost importance. However, the existing framework of writing, distributing and linking against code in the form of libraries and/or ...
Abstract. This paper presents the design, implementation and experimental analysis of a distributed, real-time MPEG video and audio player. The player is designed for use across th...
Shanwei Cen, Calton Pu, Richard Staehli, Crispin C...
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
— This paper first presents a novel control strategy for periodic motion control based on a Hamiltonian system. According to the strategy, hybrid symmetric orbits (ideal walking...