The paper is centered on the active initiatives from the ICT (Information and Communication Technology) field using analysis and comparison of adopted solutions in ICT products for the support of competitive advantages. Confrontation of existing options is demonstrated on a security layer of selected products. This wider analysis brings an ...Download Now
In this paper, the authors propose an extended version of the ping-pong protocol and study its security. The proposed protocol incorporates the usage of mutually unbiased bases in the control mode. They show that, by increasing the number of bases, it is possible to improve the security of this protocol. ...Download Now
Low-Density Parity-Check (LDPC) codes are one of the best known error correcting coding methods. This paper concerns the hardware iterative decoder for a subclass of LDPC codes that are implementation oriented, known also as Architecture Aware LDPC. The decoder has been implemented in a form of synthesizable VHDL description. To ...Download Now
The application of Business Process Management (BPM) and Workflow Management (WfM) technologies for design and verification of electronic systems is not straightforward. Flexible, evolving and human-centred process execution is needed to support creative design tasks performed by designers. Rigorous control and automation of procedures are needed for quality assurance, training, ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?