Complexity of software systems has significantly grown with social dependence on computer system, especially for mobile and internet. So we present component-based communication pr...
Hong-Jun Dai, Tian-Zhou Chen, Chun Chen, Jiang-Wei...
In this paper, we propose to use graph-mining techniques to understand the communication pattern within a data-centre. We model the communication observed within a data-centre as a...
Maitreya Natu, Vaishali P. Sadaphal, Sangameshwar ...
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
We investigate the properties of a multiagent system where each (distributed) agent locally perceives its environment. Upon perception of an unexpected event, each agent locally c...
Gauvain Bourgne, Gael Hette, Nicolas Maudet, Suzan...
Abstract: In this paper, we consider a two-way or bidirectional communications system with a relay equipped with multiple antennas. We show that when the downlink channel state inf...
Chau Yuen, Woon Hau Chin, Yong Liang Guan, Wenhua ...