Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
In this paper the objective is to enhance the spectral efficiency using combinations of transmit antenna selection with Linear Dispersion Code Selection. Both bit error rate minimi...
This paper presents a novel beat detector that operates in the Huffman coded domain of a MP3 audio bitstream. We seek to answer two main questions. First, whether it is possible t...
The CyberCode is a visual tagging system based on a 2Dbarcode technology and provides several features not provided by other tagging systems. CyberCode tags can be recognized by t...
One of the visions of pervasive computing is using mobile computers to interact with networked devices. A question raised by this vision is: Should the userinterfaces of these dev...