Many of the routing protocols that have been designed for wireless ad-hoc networks focus on energy-efficiency and guaranteeing high throughput in a non-adversarial setting. Howev...
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...
We propose a speech-based conversation environment called Voice Cafe for facilitating dynamic knowledge interaction. Dynamic knowledge interaction is a key concept for creative in...
: The interactivity afforded to the learner by the computer based media is often fairly restricted. This may be by design choice but is often brought about by resource constraints....