—Emerging applications of computer vision and pattern recognition in mobile devices and networked computing require the development of resourcelimited algorithms. Linear classifi...
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
In this paper, we study the application of physical layer network coding to the joint design of uplink and downlink transmissions, where the base station and the relay have multip...
Zhiguo Ding, Ioannis Krikidis, John S. Thompson, K...
With the rise of mobile media devices, resizing an image or video to fit a screen of arbitrary size has become an important topic. In general, arbitrary resizing does not preserve...
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...