The paper proposes an analytical approach to blocking probability calculation in the UMTS network carrying a mixture of multi-rate traffic, under the assumption that the part of re...
Maciej Stasiak, Piotr Zwierzykowski, Damian Parnie...
Beamforming and relaying are two methods of improving wireless system performance. Until now, these techniques have been considered separately. In this paper, a single source (base...
In this paper, we present a comparison between the sensitivity of SC-FDMA and OFDMA schemes to large carrier frequency offsets (CFO) and timing offsets (TO) of different users on t...
We consider a wireless multi-hop network and design an algorithm for jointly optimal scheduling of packet transmissions and network coding. We consider network coding across differ...
We propose a novel equalizer for ultrawideband (UWB) multiple-input multiple-output (MIMO) channels characterized by severe delay spreads. The proposed equalizer is based on reacti...
N. Srinidhi, Saif K. Mohammed, Ananthanarayanan Ch...
A significant number of failures in e-voting systems have arisen because of poorly specified requirements, combined with an ad-hoc approach to engineering multiple variations of si...
The security of software applications is an important domain, and one that mixes formalisms (e.g. when dealing with cryptography and security protocols) with very ad hoc, low level...
The Call Processing Language (CPL) is one of the best known approaches developed for creating telephony services in Internet telephony. Its XML-based structure makes it a flexible ...
Abstract. The idea of feature-oriented programming is to map requirements to features, concepts that can be composed to form a software product. Change-oriented programming (ChOP),...
Peter Ebraert, Andreas Classen, Patrick Heymans, T...
Abstract. Current generative programming approaches use configuration knowledge to automatically manufacture an end product given a particular requirements specification. Such conf...