In this paper, we present a novel statistical full-chip leakage power analysis method. The new method can provide a general framework to derive the full-chip leakage current or po...
Ruijing Shen, Ning Mi, Sheldon X.-D. Tan, Yici Cai...
— Most existing work uses dual decomposition and subgradient methods to solve network optimization problems in a distributed manner, which suffer from slow convergence rate prope...
Ali Jadbabaie, Asuman E. Ozdaglar, Michael Zargham
Against the background of the current financial crisis and an aftermath of increasing regulation, companies enhance and integrate information systems in the areas of risk manageme...
Anke Gericke, Hans-Georg Fill, Dimitris Karagianni...
Kirsch's factorization method is a fast inversion technique for visualizing the profile of a scatterer from measurements of the far-field pattern. The mathematical basis of t...
Industrial implementation of model-based control methods, such as model predictive control, is often complicated by the lack of knowledge about the disturbances entering the syste...
Brian J. Odelson, Murali R. Rajamani, James B. Raw...