Public portals, such as Web search engines, have been available for a number of years and corporate portals that facilitate access to enterprise information within a company, norm...
Michael A. Shepherd, David Zitner, Carolyn R. Watt...
Abstract— We consider transmission of two arbitrarily correlated sources over a discrete memoryless asymmetric multiple access channel, where one of the sources is available at b...
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
—The two-way relay channel (TWRC) describes the communication between two terminals sharing a common relay. In this work we compare different protocols for the TWRC with a half-d...
In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the...