Abstract— In this paper, we consider the unclaimed subcarriers that no user feeds back in an opportunistic OFDMA system with a per sub-carrier power constraint. Unclaimed subcarr...
The systematic exploration of the space of all the behaviours of a software system forms the basis of numerous approaches to verification. However, existing approaches face many c...
Sriram Sankaranarayanan, Richard M. Chang, Guofei ...
Computer assistance for breast conserving surgery requires a guidance method to assist a surgeon in locating tumor margin accurately. A wide array of guidance methods can be consid...
Michel-Alexandre Cardin, Jian-Xiong Wang, Donald B...
This paper presents a new method to automatically generate posynomial symbolic expressions for the performance characteristics of analog integrated circuits. The coefficient set ...
Tom Eeckelaert, Walter Daems, Georges G. E. Gielen...
Even the best laid plans can fail, and robot plans executed in real world domains tend to do so often. The ability of a robot to reliably monitor the execution of plans and detect...
Abdelbaki Bouguerra, Lars Karlsson, Alessandro Saf...