Many models from a variety of areas involve the computation of an equilibrium or fixed point of some kind. Examples include Nash equilibria in games; market equilibria; computing o...
In this thesis, we describe a decentralized supply chain formation problem where the
supply chain planner or a central design authority (CDA) is faced with the decision
of choosi...
Pattern matching is essential to a wide range of applications such as network intrusion detection, virus scanning, etc. Pattern matching algorithms normally rely on state machines...
Input vector control (IVC) technique utilizes the stack effect in CMOS circuit to apply the minimum leakage vector (MLV) to the circuit at the sleep mode to reduce leakage. Additi...
In cognitive radio networks (CRNs), spectrum sensing is key to opportunistic spectrum access while preventing any unacceptable interference to primary users’ communications. Alt...