— Most of the existing video streaming systems employ the worst case analysis in application layer buffer size dimensioning. Even though the worst case buffer size dimensioning p...
This paper presents a dynamic semantics for the parallel language HARPO/L, based on Reynolds’s grainless approach [1]. It shows that the approach scales to somewhat more sophist...
The second-order HF radar ocean cross section is derived for the case of the transmitting and receiving antenna undergoing platform (i.e. barge) motion. The derivation for electro...
In this paper we present algorithms for transmitter adaptation in downlink wireless systems based on maximization of the Signal-to-Interference plus Noise-Ratio (SINR). We investi...
Dimitrie C. Popescu, Shiny Abraham, Otilia Popescu
—Spectrum awareness is a crucial first step of a cognitive radio (CR). This provides information necessary for the CR to adapt to the radio frequency environment, and involves re...
Qiyun Zhang, Octavia A. Dobre, Sreeraman Rajan, Ro...
In this paper, we present a new block cipher, referred as PUFFIN2, that is designed to be used with applications requiring very low circuit area. PUFFIN2 is designed to be impleme...
A complex system is expected to show different nominal behaviors under different conditions, and the deviation over time from these nominal behaviors is an indicator of potential ...
Yanjun Yan, Lisa Ann Osadciw, Glen Benson, Eric Wh...
The inverse diffusion problems deal with the estimation of many crucial parameters such as the diffusion coefficient, source properties, and boundary conditions. Such algorithms ...
A workstation requires a low-power design similar to a typical PC. In this paper we propose several strategies to reduce the power consumption of a workstation. First, we must com...
Abstract—In this work, we propose a framework for supervisory cooperative estimation of multi-agent linear time-invariant (LTI) systems. We introduce a group of sub-observers, ea...