Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Clusters of workstations and networked parallel computing systems are emerging as promising computational platforms for HPC applications. The processors in such systems are typica...
Prashanth B. Bhat, Viktor K. Prasanna, Cauligi S. ...
We present a WLAN location determination technique, the Joint Clustering technique, that uses (1) signal strength probability distributions to address the noisy wireless channel, ...
A multi-hop relay network with multiple antenna terminals in a quasi-static slow fading environment is considered. The fundamental diversity-multiplexing gain tradeoff (DMT) is an...
Abstract. Limited bandwidth to off-chip main memory is a performance bottleneck in chip multiprocessors for streaming computations, such as Cell/B.E., and this will become even mor...