In this paper we design several double length hash functions and study their security properties in the random oracle model. We design a class of double length hash functions (and ...
We present efficient approximation algorithms for a number of problems that call for computing the prices that maximize the revenue of the seller on a set of items. Algorithms for ...
The estimation of the performance characteristics of robot manipulators is crucial in robot application and design. Furthermore, studying the manipulability index for every point w...
Ayssam Yehia Elkady, Mohammed Mohammed, Tarek Sobh
The routing architecture of the original 4.4BSD [3] kernel has been deployed successfully without major design modification for over 15 years. In the unified routing architectur...
— In the past, dynamic voltage and frequency scaling (DVFS) has been widely used for power and energy optimization in embedded system design. As thermal issues become increasingl...
Yongpan Liu, Huazhong Yang, Robert P. Dick, Hui Wa...