Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-ba...
Several lower bounds have been proposed for the smallest singular value of a square matrix, such as Johnson's bound, Brauer-type bound, Li's bound and Ostrowskitype boun...
— This paper deals with throughput oriented Adaptive Modulation and Coding (AMC) techniques combined with cooperative protocols where terminals are constrained by half-duplex as...
In this paper, we consider an integrated pest management model which is impulsively controlled by means of biological and chemical controls. These controls are assumed to act in a...
In the implementation of subdivision scheme, three of the most important issues are smoothness, size of support, and approximation order. Our objective is to introduce an improved...