Abstract The current OWL 2 specification provides mechanisms for importing whole ontologies. This paper discusses the import of only a module of an external ontology, which is spe...
Abstract. Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ru...
ML modules provide hierarchical namespace management, as well as fine-grained control over the propagation of type information, but they do not allow modules to be broken up into ...
Abstract— We investigate adaptive modulation using the network utility maximization framework. We derive new crosslayer optimal power and rate adaptation policies for several pra...
Daniel O'Neill, Andrea J. Goldsmith, Stephen P. Bo...
Abstract— This paper considers hybrid-ARQ under the constraints of noncoherent orthogonal modulation and hard-decision decoding. Information theoretic bounds on the throughput fo...