: Traceability of various artifacts created during the development of software systems plays an important role in software evolution. Subsequent changes to artifacts must be traced...
Tseng et al. have introduced in 2003 an authenticated encryption scheme by using self-certified public keys. Based on this scheme several authors have proposed new signature schem...
In this paper, we propose the definition of a measure for sets of strings of length not greater than a given number. This measure leads to an instanciation of the uniform distribut...
We derive the exact maximal-ratio combining (MRC) performance of dual-hop cooperative diversity systems with L-antenna destination reception in Nakagami-m fading channels, where a ...
In this paper we discuss two image-based 3D modeling methods based on a multi-resolution evolution of a volumetric function's levelset. In the former the role of the levelset...