Several time series matching techniques have been proposed for content-based music retrieval. These techniques represent a melody by a time series of pitch values and use time war...
We consider the problem of computing a representation of the plane graph induced by one (or more) algebraic curves in the real plane. We make no assumptions about the curves, in p...
This paper argues that basing the semantics of concurrent systems on the notions of state and state transitions is neither advisable nor necessary. The tendency to do this is deepl...
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
— We consider a multi-user MIMO downlink where the transmitter has only estimates of the channel while the receivers have perfect channel information. The impact of channel estim...