Similarity search has been widely studied in peer-to-peer environments. In this paper, we propose the Bounded Locality Sensitive Hashing (Bounded LSH) method for similarity search...
—Tag collisions can impose a major delay in Radio Frequency IDentification (RFID) systems. Such collisions are hard to overcome with passive tags due to their limited capabiliti...
We propose a method for dynamic security domain scaling on SMPs that offers both highly scalable performance and high security for future high-end embedded systems. Its most impor...
— This paper analyzes the average bit error rate (BER) performance of singular value decomposition-based multiple-input multiple-output systems with channel estimation error and ...
Edward K. S. Au, Shi Jin, Matthew R. McKay, Wai Ho...
- Usually, packets involved in a collision are lost, requiring the retransmission of all packets. However, if we do not discard collided packets and we use proper retransmissions w...