In this survey, we outline basic SAT- and ATPGprocedures as well as their applications in formal hardware verification. We attempt to give the reader a trace trough literature and...
— Most mobile wireless networking research today relies on simulations. However, fidelity of simulation results has always been a concern, especially when the protocols being st...
Pradipta De, Ashish Raniwala, Srikant Sharma, Tzi-...
When mining large databases, the data extraction problem and the interface between the database and data mining algorithm become important issues. Rather than giving a mining algo...
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
— The Interference Temperature Model was proposed by the FCC in 2003 as a way to dynamically manage and allocate spectrum resources. It would allow unlicensed radios to sense the...