Sciweavers

1236 search results - page 78 / 248
» Prefix-Like Complexities and Computability in the Limit
Sort
View
CSCWD
2009
Springer
15 years 4 months ago
Random stimulus generation with self-tuning
Constrained random simulation methodology still plays an important role in hardware verification due to the limited scalability of formal verification, especially for the large an...
Yanni Zhao, Jinian Bian, Shujun Deng, Zhiqiu Kong
ICC
2008
IEEE
121views Communications» more  ICC 2008»
15 years 4 months ago
Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks
—It is not possible to ensure that a network is absolutely secure. Therefore, network operators must continually change their defense strategies to counter attackers who constant...
Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen
DATE
2007
IEEE
114views Hardware» more  DATE 2007»
15 years 4 months ago
Fast positive-real balanced truncation of symmetric systems using cross Riccati equations
We present a computationally efficient implementation of positive-real balanced truncation (PRBT) for symmetric multiple-input multiple-output (MIMO) systems. The solution of a p...
Ngai Wong
DATE
2007
IEEE
144views Hardware» more  DATE 2007»
15 years 4 months ago
Adaptive power management in energy harvesting systems
Recently, there has been a substantial interest in the design of systems that receive their energy from regenerative sources such as solar cells. In contrast to approaches that at...
Clemens Moser, Lothar Thiele, Davide Brunelli, Luc...
ICC
2007
IEEE
15 years 4 months ago
Opportunistic Power Allocation for Random Beamforming in MISO Broadcast Channels
Abstract— This paper proposes the opportunistic power allocation (OPA) scheme for random beamforming with a limited feedback rate. Without the channel state information, the prop...
Edward W. Jang, Hyukjoon Kwon, John M. Cioffi