As complexity of real-time embedded software grows, it is desirable to use formal verification techniques to achieve a high level of assurance. We discuss application of model-ch...
The performance of user-cooperation in a multi-access network is compared to that of using a wireless relay. Using the total transmit and processing power consumed at all nodes as...
Lalitha Sankar, Gerhard Kramer, Narayan B. Mandaya...
an be used to abstract away from the physical reality by describing it as components that exist in discrete states with probabilistically invoked actions that change the state. The...
Duncan Gillies, David Thornley, Chatschik Bisdikia...
We consider a two-stage sensing scheme for cognitive radios where coarse sensing based on energy detection is performed in the first stage and, if required, fine sensing based o...
— Although efficient processing of probabilistic databases is a well-established field, a wide range of applications are still unable to benefit from these techniques due to t...