Recent years have seen numerous examples when designs play an important role in the study of such topics in cryptography as secrecy and authentication codes, secret sharing scheme...
Equidistant Frequency Permutation Arrays are combinatorial objects of interest in coding theory. A frequency permutation array is a type of constant composition code in which each ...
Sophie Huczynska, Paul McKay, Ian Miguel, Peter Ni...
—The projection of a photographic dataset on a 3D model is a robust and widely applicable way to acquire appearance information of an object. The first step of this procedure is...
Matteo Dellepiane, Ricardo Marroquim, Marco Callie...
—Intelligent mobile terminals (or users) of next generation wireless networks are expected to initiate voice over IP (VoIP) calls using session set-up protocols like H.323 or SIP...
Software pipelining and unfolding are commonly used techniques to increase parallelism for DSP applications. However, these techniques expand the code size of the application sign...
Bin Xiao, Zili Shao, Chantana Chantrapornchai, Edw...