With the proliferation of different types of IC packages, there is a need for machine-vision-based inspection systems to be able to efficiently identify the orientation of IC packa...
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples are smartcards, RF-ID tags and mobile terminals. This paper presents a HW/SW c...
—The nodes in wireless sensor networks often collect correlated measurements. Not taking into account this information redundancy is detrimental to the network lifetime, since co...
The IEEE 802.16 standard (commonly known as WiMAX) which has emerged as a broadband wireless access technology, is capable of delivering very high data rates. However, providing p...
One of the most critical resource management issues in the use of ternary content addressable memory (TCAM) for packet classification/filtering is how to effectively support filte...