Abstract—In this paper we aim to solve the multiuser multiinput multi-output (MIMO) downlink beamforming problem. The transmitter is a multi-antenna base-station broadcasting to ...
Abstract—Most contemporary security mechanisms and protocols include exchange of random or time-variant nonces as an essential means of protection against replay and other threat...
Abstract– This paper presents an improved topological algorithm for device-level analog placement with symmetry constraints. Based on the exploration of symmetric-feasible sequen...
Karthik Krishnamoorthy, Sarat C. Maruvada, Florin ...
Abstract. Exploration algorithms are relevant to the industrial practice of gentest cases from an abstract state machine whose runs define the predicted behavior of the software s...
The concept of context can be used with advantage in the area of Computer-Supported Cooperative Work. For many years, the awareness term has been used in this area without explici...