Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Background: Many complementary solutions are available for the identifier mapping problem. This creates an opportunity for bioinformatics tool developers. Tools can be made to fle...
Martijn P. van Iersel, Alexander R. Pico, Thomas K...
The diversity of end-terminal and access network capabilities as well as the dynamic nature of wireless connections pose significant challenges to providers of multimedia streamin...
Andreas Hutter, Peter Amon, G. Panis, Eric Delfoss...
This paper deals with the visual content adaptation, in the context of MPEG-21 standard, to help low vision users have better accessibility to the contents. The proposed adaptatio...
In carrier sense multiple access with collision avoidance (CSMA/CA) wireless networks, adaptive physical carrier sense (CS) mechanisms have been proposed to maximize spatial reuse...