Sciweavers

2845 search results - page 346 / 569
» Constraints over Ontologies
Sort
View
ASPDAC
2007
ACM
96views Hardware» more  ASPDAC 2007»
14 years 2 months ago
Hierarchical Optimization Methodology for Wideband Low Noise Amplifiers
In this paper, we present a systematic synthesis methodology for fully integrated wideband low noise amplifiers that simultaneously optimizes impedance matching, noise figure, and ...
Arthur Nieuwoudt, Tamer Ragheb, Yehia Massoud
ICLP
2010
Springer
14 years 2 months ago
Logic Programming Foundations of Cyber-Physical Systems
Cyber-physical systems (CPS) are becoming ubiquitous. Almost every device today has a controller that reads inputs through sensors, does some processing and then performs actions t...
Neda Saeedloei
GLOBECOM
2007
IEEE
14 years 2 months ago
Scaling Laws for Delay Sensitive Traffic in Rayleigh Fading Networks
The throughput of delay sensitive traffic in a Rayleigh fading network is studied by adopting a scaling limit approach. The case of study is that of a pair of nodes establishing a ...
Nikhil Karamchandani, Massimo Franceschetti
GLOBECOM
2009
IEEE
14 years 2 months ago
Evolutionary Games for Hybrid Additive White Gaussian Noise Multiple Access Control
Abstract-- In this paper, we propose an evolutionary gametheoretic framework for hybrid additive white Gaussian noise multiple access channels. We consider a communication system c...
Quanyan Zhu, Hamidou Tembine, Tamer Basar
ADBIS
2004
Springer
92views Database» more  ADBIS 2004»
14 years 2 months ago
Optimal Database Locks for Efficient Integrity Checking
Abstract. In concurrent database systems, correctness of update transactions refers to the equivalent effects of the execution schedule and some serial schedule over the same set o...
Davide Martinenghi