RFID (Radio-Frequency Identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility i...
We present a statistical optimization framework for solving the end-to-end problem of progressive transmission of images over noisy channels. We consider the impacts of transmissi...
Although scan-based designs are widely used in order to reduce the complexity of test generation, test application time and test data volume are substantially increased. We propos...
In 2004, a new attack against SHA-1 has been proposed by a team leaded by Wang [15]. The aim of this article5 is to sophisticate and improve Wang’s attack by using algebraic tech...
Within the public sector, the deployment of enterprise architecture is often an attempt to address the decentralization/centralization relationships to improve the links between t...