Abstract. The use of algorithmic verification and synthesis tools for hybrid systems is currently limited to systems exhibiting simple continuous dynamics such as timed automata o...
The ASU Libraries' staff had considerable experience creating digital library systems to satisfy the needs of a major university library. These systems were designed to be hig...
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
— A multiple transmit antenna, single receive antenna (per receiver) downlink channel with limited channel feedback is considered. Given a constraint on the total system-wide cha...
— We consider a MIMO line of sight (LOS) broadcast channel where each user has perfect knowledge of its own channel and feeds back ‘quantized’ channel information to the tran...