Mobile computers such as notebooks, subnotebooks, and palmtops require low weight, low power consumption, and good interactive performance. These requirements impose many challeng...
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Abstract—In multicast/broadcast services over infrastructurebased/cellular wireless networks (e.g. 3G cellular networks, WiMax, DVB), data is transmitted to multiple recipients f...
Kaustubh Sinkar, Amit Jagirdar, Thanasis Korakis, ...
— Developers and end-users have to interface robotic systems for control and feedback. Such systems are typically co-engineered with their graphical user interfaces. In the past,...
We developed technologies for transmitting video contents over wireless platforms, and encapsulated these video delivery and presentation technologies into a client system for acc...
Michael R. Lyu, Jerome Yen, Edward Yau, Sam K. S. ...