Triangulation of scattered points is the first important section during reverse engineering. New concepts of dynamic circle and closed point are put forward bas
An efficient scheme of wavelength reuse is presented for solving the capacity limitation of WDM star single-hop networks by limited wavelengths. According to th
The VC merging algorithm is used widely for multipoint to point ATM communication. For AAL5 lacking multiplex ID field, the downstream receiving point cannot
This paper studies the user-level security of mobile systems. The current mobile phone users trust the invisible security of the 2G systems. The evolution from