We consider equation systems of the form X1 = f1(X1, . . . , Xn), . . . , Xn = fn(X1, . . . , Xn) where f1, . . . , fn are polynomials with positive real coefficients. In vector fo...
Javier Esparza, Stefan Kiefer, Michael Luttenberge...
Abstract--Physical transceiver implementations for multipleinput multiple-output (MIMO) wireless communication systems suffer from transmit-RF (Tx-RF) impairments. In this paper, w...
Abstract-- The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the n...
Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poo...
As passive optical networks (PON) are increasingly deployed to provide high speed Internet access, it is important to understand their fundamental traffic capacity limits. The pape...
Nelson Antunes, Christine Fricker, Philippe Robert...
This paper considers a tree-rewriting framework for modeling documents evolving through service calls. We focus on the automatic verification of properties of documents that may c...