Abstract— This contribution analytically studies the influence of IQ mismatch on the performance of multiple-antenna orthogonal frequency division multiplexing (OFDM) systems ba...
Tim C. W. Schenk, Erik R. Fledderus, Peter F. M. S...
: Traditional methods of digital forensics analyze a static disk image--a bitstream copy of a disk created while the system is offline. Recent trends--including greatly increased d...
This paper addresses the analysis of concurrent programs with shared memory. Such an analysis is undecidable in the presence of multiple procedures. One approach used in recent wor...
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Simulation models are built with the intent of studying the behavior of the real system represented by the model. However, a simulation model generates random outputs; thus, the d...