Abstract— This paper presents a new approach for estimating in real-time the parameters of the advection-diffusion equation that describes the propagation of an instantaneously r...
Vassilios N. Christopoulos, Stergios I. Roumelioti...
Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through sidechannels. Sensitive information, such as secret keys, can be obtai...
With the rising popularity of digital music archives the need for new access methods such as interactive exploration or similarity-based search become significant. In this paper ...
Robert Neumayer, Michael Dittenbach, Andreas Raube...
In this paper, we develop adaptive metrics to identify stable links in a mobile wireless networking environment based on the analysis of link durations in several different mobili...
Michael Gerharz, Christian de Waal, Matthias Frank...
Ethernet communication devices, such as adapter, hub, bridge and switch, all follow IEEE 802.3 standard protocol. We have designed and implemented an integrated 10/100 Mbps Etherne...