Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
A growing number of applications require high capacity, high throughput tertiary storage systems 1 2 . We are investigating how data striping ideas apply to arrays of magnetic tap...
An analytical model is developed to solve the power-rate assignment problem for multi-rate CDMA systems and calculate the probability density function (PDF) for the downlink traffi...
Motivated by scheduling in cellular wireless networks and resource allocation in computer systems, we study a service facility with two classes of users having heterogeneous servi...
Wireless digital video broadcasting has experienced much success in recent years with some industrial systems deployed. We study in this paper how to recover lost packets in video...