Previous studies have shown that wireless DSP algorithms exhibit high levels of data level parallelism (DLP). Commercial and research work in the field of software defined radio...
Mark Woh, Yuan Lin, Sangwon Seo, Trevor N. Mudge, ...
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
In this paper we make the case for the existence and importance of a special class of email user, the highthroughput email user, whose needs are not wellserved by current clients....
This paper presents an on-going investigation on interruptions in the office caused by face-to-face interactions between knowledge workers. The study aims to identify opportunitie...
In this paper, we present a WebTop XML Editor by which the user can edit XML Documents on views generated by user-defined styles. Meta XSLT is the key technology of this feature. ...