Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
—Multiple input multiple output (MIMO) system has been recognized as a promising candidate for future wireless communication. The adaptive modulation which adjusts the transmitte...
Feng Jiang, Ying Wang, Xi Fang, Kai Sun, Guona Hu,...
Abstract— This paper discusses the design and current capabilities of a new software tool, dVC, capable of simulating planar systems of bodies experiencing unilateral contacts wi...
Stephen Berard, Jeffrey C. Trinkle, Binh Nguyen, B...
This paper presents the design and implementation of a compiler algorithm that effectively optimizes programs for energy usage using dynamic voltage scaling (DVS). The algorithm ...