Sciweavers

12084 search results - page 2378 / 2417
» Effect Systems with Subtyping
Sort
View
ENTCS
2007
113views more  ENTCS 2007»
13 years 10 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan
JSA
2006
97views more  JSA 2006»
13 years 10 months ago
Dynamic feature selection for hardware prediction
It is often possible to greatly improve the performance of a hardware system via the use of predictive (speculative) techniques. For example, the performance of out-of-order micro...
Alan Fern, Robert Givan, Babak Falsafi, T. N. Vija...
JSAC
2006
77views more  JSAC 2006»
13 years 10 months ago
Spectral shaping of UWB signals for time-hopping impulse radio
This paper studies the design of signaling waveforms for time-hopping impulse radio (TH-IR) with limits on the power spectral density. Such restrictions are imposed by the spectra...
Yves-Paul Nakache, Andreas F. Molisch
JSAC
2006
174views more  JSAC 2006»
13 years 10 months ago
Integrated Radio Resource Allocation for Multihop Cellular Networks With Fixed Relay Stations
Recently, the notion that a logical next step towards future mobile radio networks is to introduce multihop relaying into cellular networks, has gained wide acceptance. Nevertheles...
Yajian Liu, Reza Hoshyar, X. Yang, Rahim Tafazolli
JSAC
2006
181views more  JSAC 2006»
13 years 10 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
« Prev « First page 2378 / 2417 Last » Next »