Abstract. We propose a symbolic algorithm to accurately predict atomicity violations by analyzing a concrete execution trace of a concurrent program. We use both the execution trac...
Chao Wang, Rhishikesh Limaye, Malay K. Ganai, Aart...
— We consider a relay that simultaneously assists multiple source-destination pairs that do not have a direct link, the so-called gateway channel, and explore the sum capacity of...
It is well-known that opportunistic transmission schemes are sumcapacity optimal, in the Shannon sense, for symmetric cellular networks with single-antenna transceivers. However, ...
Pengcheng Zhan, Ramesh Annavajjala, A. Lee Swindle...
This paper presents a test framework to support unit component testing in distributed component-based systems that are built upon component technologies like CORBA, COM/.NET, J2EE...
Video applications on mobile handheld devices are very challenging mainly due to the complex computational needs of video decoding and the limited capacity of batteries of handhel...