We propose a generic computational framework for maintaining a discrete geometric structure defined by a collection of static and mobile objects. We assume that the mobile object...
David M. Mount, Nathan S. Netanyahu, Christine D. ...
This paper presents VISTA, a new methodology and tool dedicated to analyse system level performance by executing full-scale SW application code on a transaction-level model of the...
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
A concurrent engineering-oriented design database representation model (CE-DDRM) is introduced in this research for supporting various life-cycle aspects in concurrent design. In ...
The previous link adaptation algorithms on ofdm based systems use equal modulation order for all sub carrier index within a block. For multimedia transmission using ofdm as the mo...