Author:
Moon Jeong-Kyung,Kim Jin-Mook
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference14 articles.
1. Bozdag E, Meshbah A (2007) A comparison of push and pull techniques for Ajax, WSE 2007. 9th IEEE Int Workshop; pp.15–22
2. Chiu H-H, Tang Y-J, Wang M-S (2015) Using dead reckoning, GPS and fingerprinting for ubiquitous positioning, ubiquitous computing application and wireless sensor. LNEE 331:31–43
3. Deukjo H, Jung-Keun L, Dong-Chan K, Daesung K, Kwon Ho R, Dong-Geon L (2014) LEA: a 128-Bit block cipher for fast encryption on common processors. Inf Security Appl Lecture Notes Comput Sci 8267:3–27
4. Donggeon L, Dong-Chan K, Daesung K, Howon K (2014) Efficient hardware implementation of the lightweight block encryption algorithm LEA. Sensors 14(1):975–994
5. Gannot S et al (2001) Signal enhancement using beamforming and nonstationarity with applications to speech. IEEE Trans Signal Process 49(8):1614–1626