—In this paper, we model and analyze the interactions between secondary users in a spectrum overlay cognitive system as a cognitive MAC game. In this game, each secondary user ca...
Lok Man Law, Jianwei Huang, Mingyan Liu, Shuo-Yen ...
Software verification using model checking often translates programs into corresponding transition systems that model the program behavior. As software systems continue to grow i...
The ability to use help-resources efficiently is an important skill in any learning environment, whether the student is in a traditional classroom or is using an Intelligent Tutor...
A novel algorithm is described for coding objects in video compression systems which gives complete control over the bit allocation to the video objects. The method is evaluated b...
We consider the problem of selecting a subset of p out of n sensors for the purpose of event detection, in a wireless sensor network (WSN). Occurrence or not of the event of intere...