The verification of large radio-frequency/millimeter-wave (RF/MM) integrated circuits (ICs) has regained attention for high-performance designs beyond 90nm and 60GHz. The traditio...
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...
: The purpose of this paper is to identify internal factors within government that affect the adoption and use of government websites. A conceptual framework, based on a literature...
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
We present the problem of estimating cortical connectivity between different regions of the cortex from scalp electroencephalographic (EEG) or magnetoencephalographic (MEG) data a...