This paper proposes a mathematical model for distinguishing services at bit-level. By using correlation analysis, the features of bit flows are extracted. The f
A weakness of unforgeability is found in Ma and Chen scheme, and the root cause is the susceptive linear design in the scheme. In order to avoid the weakness an
This paper describes a parallel computing platform using the existing facilities for the digital watershed model. In this paper, distributed multi-layered struc
An overlay share mesh infrastructure is presented for high dynamic group communication systems, such as distributed interactive simulation (DIS) and distributed
In wireless sensor networks (WSNs), a faulty sensor may produce incorrect data and transmit them to the other sensors. This would consume the limited energy and
To cope with the ever-increasing susceptibility to transient fault in modem processors, a scheme called Tri-modular Redundantly and Simultaneously Threaded proc
The poly(butylene succinate-co-terephthalate) (PBST) copolyesters with different monomer composition were synthesized by polycondensation. The isothermal crysta