— The characterization of downlink traffic power is an important issue for the design of efficient call admission control (CAC) and radio resource management (RRM) procedures. In...
Software model checkers work directly on single-process programs, but not on multiple processes. Conversion of processes into threads, combined with a network model, allows for mo...
Cyrille Artho, Christian Sommer 0002, Shinichi Hon...
— Designing and implementing artificial self-organizing systems is a challenging task since they typically behave nonintuitive and no theoretical foundations exist. Predicting a...
The existing solutions in the field of computer forensics are largely ad hoc. This paper discusses the need for a rigorous model of forensics and outlines qualities that such a m...
Sean Peisert, Matt Bishop, Sidney Karin, Keith Mar...
We consider a model for interacting objects, where the evolution of each object is given by a finite state Markov chain, whose transition matrix depends on the present and the pa...
Jean-Yves Le Boudec, David McDonald, Jochen Mundin...
XML-based interchange formats for performance models provide a mechanism whereby performance model information may be transferred among modeling tools. For example, the PMIF allow...
This paper presents a multi-dimensional point scatterer distribution model for the context of ultrasound image simulation. The model has a simple parameterisation, has low computa...
We present a new Finite Impulse Response (FIR) model for hemodynamics in functional brain images. Like other FIR models, our method permits a flexible formulation of the hemodyna...
— In this paper we build an imitation learning algorithm for a humanoid robot on top of a general world model provided by learned object affordances. We consider that the robot h...
This paper proposes the study of a new computation model that attempts to address the underlying sources of performance degradation (e.g. latency, overhead, and starvation) and th...
Guang R. Gao, Thomas L. Sterling, Rick Stevens, Ma...