As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
Abstract. The XCB mode of operation was outlined in 2004 as a contribution to the IEEE Security in Storage effort, but no security analysis was provided. In this paper, we provide...
Poorly designed software systems are difficult to understand and maintain. Modifying code in one place could lead to unwanted repercussions elsewhere due to high coupling. Adding ...
Martin Drozdz, Derrick G. Kourie, Bruce W. Watson,...
In this paper, a low-complexity 8x8/4x4 Adaptive Blocksize Transform (ABT) scheme is tentatively proposed for the Chinese Audio and Video coding Standard (AVS)1 . In the proposed ...
Group-to-individual (G2I) distributed meeting is an important but understudied area. Because of the asymmetry between different parties in G2I meetings, it has two unique challeng...
Yong Rui, Eric Rudolph, Li-wei He, Rico Malvar, Mi...