Abstract. In this article we introduce redundant trinomials to represent elements of finite fields of characteristic 2. This paper develops applications to cryptography, especial...
Early estimation of defect density of a product is an important step towards the remediation of the problem associated with affordably guiding corrective actions in the software d...
Mark Sherriff, Nachiappan Nagappan, Laurie A. Will...
Since there is no method to verify the trustworthiness of shared files in P2P file sharing systems, malicious peers can spread untrustworthy files to the system. In order to pre...
The common approach to reduce cache conflicts is to increase the associativity. From a dynamic power perspective this associativity comes at a high cost. In this paper we present...
Energy efficiency is a critical issue in designing sensor networks, as the nodes have limited battery power. In this paper we propose to move the BS so as to prolong the network l...