To satisfy the advanced forward-error-correction (FEC) standards, in which the Convolutional code and Turbo code may co-exit, a prototype design of a unified Convolutional/Turbo de...
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Relational Coarsest Partition Problems (RCPPs) play a vital role in verifying concurrent systems. It is known that RCPPs are P-complete and hence it may not be possible to design ...
Large enterprises in application domains such as finance, banking, travel services, and hospital management use business processes for their day-to-day business. An integral part ...
Eleanna Kafeza, Dickson K. W. Chiu, Kamalakar Karl...
: This paper discussesthedesignandperformance of a hierarchical proxy-cache designed to make Internet information systems scale better. The design was motivated by our earlier trac...
Anawat Chankhunthod, Peter B. Danzig, Chuck Neerda...