Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original imag...
This paper proposes a novel technique to extract range using a phase-only filter for a laser beam. The workspace is partitioned according to M meaningful preplanned range segments...
— Cooperative communication can be used to reduce the transmit power of distant mobile units, compared to conventional direct transmission, given the same quality-of-service. How...
One of the security issues in embedded system is the ability of an adversary to perform side channel attacks. Power analysis attacks are often very successful, where the power seq...
Jude Angelo Ambrose, Roshan G. Ragel, Sri Paramesw...
Behavioural theory predicts that interventions that improving individual reviewers' expertise improves Software Development Technical Review group performance [3, p 6]. This ...