Sciweavers

91 search results - page 10 / 19
» Confined modified realizability
Sort
View
CADE
2006
Springer
14 years 10 months ago
Extracting Programs from Constructive HOL Proofs Via IZF Set-Theoretic Semantics
Church's Higher Order Logic is a basis for proof assistants -- HOL and PVS. Church's logic has a simple set-theoretic semantics, making it trustworthy and extensible. We ...
Robert L. Constable, Wojciech Moczydlowski
ISSTA
2009
ACM
14 years 4 months ago
Specifying the worst case: orthogonal modeling of hardware errors
During testing, the execution of valid cases is only one part of the task. Checking the behavior in boundary situations and in the presence of errors is an equally important subje...
Jewgenij Botaschanjan, Benjamin Hummel
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
14 years 4 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
FCCM
2008
IEEE
133views VLSI» more  FCCM 2008»
14 years 4 months ago
Autonomous System on a Chip Adaptation through Partial Runtime Reconfiguration
This paper presents a proto-type autonomous signal processing system on a chip. The system is architected such that high performance digital signal processing occurs in the FPGA...
Matthew French, Erik Anderson, Dong-In Kang
ICC
2008
IEEE
138views Communications» more  ICC 2008»
14 years 4 months ago
Dealing with Sudden Bandwidth Changes in TCP
— In this paper, we propose a novel technique to deal with sudden bandwidth changes in TCP. In the current Internet, sudden bandwidth changes may occur due to vertical handovers ...
Euiyul Ko, Donghyeok An, Ikjun Yeom