— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Vertex cache of programmable geometry processor The proposed architecture of vertex cache is divided into is proposed and implemented. The proposed vertex cache is pre-TnL vertex c...
Abstract. The RTS/CTS access scheme, designed to reduce the number of collisions in a IEEE 802.11 network, is known to exhibit problems due to masked nodes, the imbalance between t...
Mohammad Z. Ahmad, Damla Turgut, R. Bhakthavathsal...
– The design of a free piston compressor (FPC) intended as a pneumatic power supply for pneumatically actuated autonomous robots is presented in this paper. The FPC is a proposed...
We present a client/server system that is able to display 3D scenes on handheld devices. This kind of devices have important restrictions of memory and computing power. Therefore,...