Verification techniques like SAT-based bounded model checking have been successfully applied to a variety of system models. Applying bounded model checking to compositional proce...
Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Jing S...
—This paper is concerned with the transmission strategies and relay selection for decode-and-forward parallel relay networks (PRNs) based on superposition coding. Our focus is on...
Jianzhong Huang 0002, Yang Yang, Xinmei Wang, Peng...
In this paper, we study the problem of measuring structural similarities of large number of source schemas against a single domain schema, which is useful for enhancing the qualit...
With decreasing costs of high quality surveillance systems, human activity detection and tracking has become increasingly practical. Accordingly, automated systems have been desig...
Jong Taek Lee, Michael S. Ryoo, Matthew Riley, Jak...
The assessment and mitigation of risks related to the availability of the IT infrastructure is becoming increasingly important in modern organizations. Unfortunately, present stan...