—Communication between cars can be exploited for various applications. Security enhancements as well as interactive games played by occupants of different cars are only two examp...
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
We present a low-cost on-line test methodology for RTL controller-datapath pairs, based on the notion of path invariance. The fundamental observation supporting the proposed metho...
Yiorgos Makris, Ismet Bayraktaroglu, Alex Orailogl...
The ability to simulate a seaport environment, including illicit cargo and the sensors designed to detect such cargo, allows the evaluation of alternative detection methods in orde...
Allen Christiansen, Damian Johnson, Lawrence B. Ho...
— Detailed and expressive e-learning specifications like IMS LD [1] are necessary to create efficient e-learning applications. E-learning specifications that meet these demand...