We consider a multi-criteria control problem that arises in a delay tolerant network with two adversarial controllers: the source and the jammer. The source's objective is to ...
The wide-spread use of P2P video streaming systems have introduced a large number of unnecessary traverse links leading to substantial network inefficiency. To address this proble...
Yan Chen, Beibei Wang, W. Sabrina Lin, Yongle Wu, ...
Software model checkers are being used mostly to discover specific types of errors in the code, since exhaustive verification of complex programs is not possible due to state explo...
Abstract. Although older people are an important user group for smart environments, there has been relatively little work on adapting natural language interfaces to their requireme...
Ravichander Vipperla, Maria Wolters, Kallirroi Geo...
We consider the broadcast phase of a spectrally efficient two-phase decode-and-forward protocol which is used by a relay node to establish a bidirectional communication between two...
Rafael F. Wyrembelski, Igor Bjelakovic, Tobias J. ...