Sciweavers

12519 search results - page 2477 / 2504
» Approximation Problems Categories
Sort
View
153
Voted
PIMRC
2010
IEEE
15 years 15 days ago
Power control versus multiuser detection based cross-layer design in wireless ad hoc networks
Abstract--In wireless ad hoc networks, multiple access interference is the limiting factor for the overall system performance. The lack of any central control unit necessitates a c...
Ulrike Korger, Christian Hartmann, Katsutoshi Kusu...
125
Voted
SAC
2010
ACM
15 years 15 days ago
A formal approach to reuse successful traceability practices in SPL projects
Software Product Line (SPL) Engineering has to deal with interrelated, complex models such as feature and architecture models, hence traceability is fundamental to keep them consi...
Angelina Espinoza, Goetz Botterweck, Juan Garbajos...
165
Voted
SIGDOC
2010
ACM
15 years 14 days ago
Musical interaction patterns: communicating computer music knowledge in a multidisciplinary project
The growing popularity of mobile devices gave birth to a still emergent research field, called Mobile Music, and concerning the development of musical applications for use in thes...
Luciano Vargas Flores, Evandro Manara Miletto, Mar...
128
Voted
SIGMOD
2010
ACM
199views Database» more  SIGMOD 2010»
15 years 14 days ago
Keyword search across databases and documents
Given the continuous growth of databases and the abundance of diverse files in modern IT environments, there is a pressing need to integrate keyword search on heterogeneous inform...
Carlos Garcia-Alvarado, Carlos Ordonez
116
Voted
SIGSOFT
2010
ACM
15 years 14 days ago
The missing links: bugs and bug-fix commits
Empirical studies of software defects rely on links between bug databases and program code repositories. This linkage is typically based on bug-fixes identified in developer-enter...
Adrian Bachmann, Christian Bird, Foyzur Rahman, Pr...
« Prev « First page 2477 / 2504 Last » Next »