This paper looks into the features of SMS (short message service) relevant to building a remote monitoring system. Based on the analysis of SMS, a set of guidelines for customizing...
Database management systems comprise various algorithms for efficiently retrieving and managing data. Typically, algorithm efficiency or performance is correlated with execution s...
Robust channel estimation scheme is essential for pulse-shaping OFDM systems in the multipath mobile environment. This paper proposes three types of channel estimation schemes for ...
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
Visual markers are graphic symbols designed to be easily recognised by machines. They are traditionally used to track goods, but there is increasing interest in their application ...