— We study hybrid search schemes for unstructured peer-to-peer networks. We quantify performance in terms of number of hits, network overhead, and response time. Our schemes comb...
Over the last years, we have witnessed the increased use of Application-Specific Instruction-Set Processors (ASIPs). These ASIPs are processors that have a customizable instruction...
In order to increase efficiency, enterprises support their business processes by information technology (IT). The majority of business processes requires human interaction. By mea...
Stefan Link, Philip Hoyer, Thomas Schuster, Sebast...
Many techniques have been proposed in the past for the protection of VLSI design IPs (intellectual property). CAD tools and algorithms are intensively used in all phases of modern...
Compressed images transmitted over noisy channels are extremely sensitive to bit errors. This necessitates the application of error control channel coding to the compressed repres...
Jiali He, Daniel J. Costello Jr., Yih-Fang Huang, ...