Understanding the flow of information is an important aspect in computer security. There has been a recent move towards tracking information in hardware and understanding the flow...
Jason Oberg, Wei Hu, Ali Irturk, Mohit Tiwari, Tim...
We propose a probabilistic contract signing protocol that achieves balance even in the presence of an adversary that may delay messages sent over secure channels. To show that this...
-This paper addresses the problem of performance analysis for maximum likelihood (ML) detection in two-input multiple-output multiplexing systems. A novel analytical method is pres...
A state/event model is a concurrent version of Mealy machines used for describing embedded reactive systems. This paper introduces a technique that uses compositionality and depend...
Abstract—This paper analyzes the performance of multipleinput multiple-output (MIMO) systems with transmit and receive antenna selection (T-RAS). The average bit error rate (BER)...