Abstract—Trust is an important yet complex and little understood dyadic relation among actors in a social network. There are many dimensions to trust; trust plays an important ro...
Sibel Adali, Robert Escriva, Mark K. Goldberg, Myk...
—Application of runtime monitoring to maintain the health of an embedded real-time software system requires that anomalous behavior be detected within a bounded time while preser...
Abstract—With the growing complexity of software applications, there is an increasing demand for solutions to distribute workload into server pools. Grid Computing provides power...
Xing Zhou, Thomas Dreibholz, Martin Becke, Jobin P...
The Time Division Duplex (TDD) uplink-downlink configuration of the 3GPP Long Term Evolution (LTE) determines how the ten subframes in a radio frame are divided between the downlin...
Riikka Susitaival, Henning Wiemann, J. Ostergaard,...
—In this paper, we present a near-lossless compression scheme for scalar-quantized source codec parameters based on iterative source-channel decoding (ISCD). The scheme is compar...
Laurent Schmalen, Peter Vary, Thorsten Clevorn, Ma...