Programming and developing of small scale software applications can be accomplished with simple command-line compilers that can be used to compile, test, and execute code generati...
Ali Farahmand Nejad, Shahabedin Bayati, Sadegh Kha...
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosy...
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
We propose a joint source-channel modeling approach for adaptively determining the quality-optimal FEC code rate. Our objective is to obtain the optimal video quality in the recei...
Yo-Won Jeong, Jae Kwon, Jae-kyoon Kim, Kyu Ho Park
— Diversity techniques are an effective answer to the challenges presented by fading channels. This paper focuses on studying the performance of systems with diversity of three f...