Many approaches recently proposed for high-speed asynchronous pipelines are applicable only to linear datapaths. However, real systems typically have non-linearities in their data...
Recep O. Ozdag, Peter A. Beerel, Montek Singh, Ste...
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Broadband satellite-based IP networks have been considered as the technology to enable a strong and promising next-generation market. In satellite communication systems, the channe...
Hongqing Zeng, Anand Srinivasan, Brian Cheng, Chan...
Background: High-density tiling arrays and new sequencing technologies are generating rapidly increasing volumes of transcriptome and protein-DNA interaction data. Visualization a...
J. Christopher Bare, Tie Koide, David J. Reiss, Da...
We define a Mobile Database Community (MDBC) as a dynamic collection of autonomous mobile databases in which each database user can access databases in the community through a wir...