CSMA-based MAC protocols require wireless nodes to share the transmission medium with other nodes that are within carriersensing (CS) range. Hence, operations that depend on and c...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
This paper focuses on the Noisy Iterated Prisoner's Dilemma, a version of the Iterated Prisoner's Dilemma (IPD) in which there is a nonzero probability that a "coop...
Reducing feature sizes and power supply voltage allows integrating more processing units (PUs) on multiprocessor system-on-chip (MPSoC) to satisfy the increasing demands of applic...
Yu Wang 0002, Jiang Xu, Shengxi Huang, Weichen Liu...
Hierarchical genome assembly can be divided into three distinct stages: sequencing and assembling shotgun reads for each of a series of selected BAC clones; assembling the resulti...
Daolong Wang, Mario Lauria, Bo Yuan, Fred A. Wrigh...