Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Bongjoo Park"'
Publikováno v:
ResearcherID
An efficient implementation of the D-homomorphism for generating de Bruijn (1946) sequences is presented. The number of exclusive-or operations required to generate the next bit for de Bruijn sequences of order n from a de Bruijn function of order k
Publikováno v:
Applied Signal Processing. 5:240
In synchronous digital communications it is important to recover the receiver clock, but this is difficult when received data contains long consecutive-zero sequences. We suggest a zero suppression (ZS) algorithm, which suppresses consecutive-zero se
Publikováno v:
Scopus-Elsevier
Computational Science and Its Applications – ICCSA 2005 ISBN: 9783540258612
ICCSA (2)
Computational Science and Its Applications – ICCSA 2005 ISBN: 9783540258612
ICCSA (2)
In this paper, we review briefly Akl and Taylor’s cryptographic solution of multilevel security problem. We propose new key management systems for multilevel security using various one-way functions.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9242715c2647434ab3aa2d2e0afef032
http://www.scopus.com/inward/record.url?eid=2-s2.0-24944433188&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-24944433188&partnerID=MN8TOARS
Autor:
Chang, Taejoo, Park, Bongjoo
Publikováno v:
IEEE Transactions on Information Theory; May99, Vol. 45 Issue 4, p1280, 4p
Autor:
Osvaldo Gervasi, Marina L. Gavrilova, Vipin Kumar, Antonio Laganà, Heow Pueh Lee, Youngson Mun, David Taniar, Chih Jeng Kenneth Tan
The four volume set assembled following The 2005 International Conference on Computational Science and its Applications, ICCSA 2005, held in Suntec International Convention and Exhibition Centre, Singapore, from 9 May 2005 till 12 May 2005, represent