Abstract. In this paper, we consider how one can analyse a stream authentication protocol using model checking techniques. In particular, we will be focusing on the Timed Efficient...
Many data compression methods cannot remove all redundancy from a file that they compress because it can be encoded to many compressed files. In particular, we consider the redund...
Abstract— A precoding technique applied to symbols transmitted in an ultra-wideband (UWB) system was proposed in [1], which can concentrate the signal power at the receiver to fa...
Yu-Hao Chang, Shang-Ho Tsai, Xiaoli Yu, C. C. Jay ...
RDMA reduces network latency by eliminating unnecessary copies from network interface cards to application buffers, but how to reduce memory registration cost is a challenge. Prev...
Abstract— A sybil node impersonates other nodes by broadcasting messages with multiple node identifiers (ID). In contrast to existing solutions which are based on sharing encryp...