We explore one method for finding the convex hull of certain mixed integer sets. The approach is to break up the original set into a small number of subsets, find a compact polyhed...
Abstract. Software security can be ensured by specifying and verifying security properties of software using formal methods with strong theoretical bases. In particular, programs c...
Jean Goubault-Larrecq, Slawomir Lasota, David Nowa...
Long-term service agreements (LTSA) for the maintenance of capital-intensive equipment such as gas turbines and aircraft engines are gaining wide acceptance. A typical LTSA contra...
The work of Boden on the nature of creativity has been extremely influential, particularly the hypothesis that the highest form of creativity results from transformation of a conce...
The problem of opportunistic access of parallel channels occupied by primary users is considered. Under a continuous-time Markov chain modeling of the channel occupancy by the prim...
Qing Zhao, Stefan Geirhofer, Lang Tong, Brian M. S...