Sciweavers

15783 search results - page 3019 / 3157
» Evidence-Based Software Engineering
Sort
View
SIAMNUM
2011
117views more  SIAMNUM 2011»
13 years 4 months ago
Construction and Convergence Study of Schemes Preserving the Elliptic Local Maximum Principle
We present a method to approximate (in any space dimension) diffusion equations with schemes having a specific structure; this structure ensures that the discrete local maximum a...
Jérôme Droniou, Christophe Le Potier
SIAMSC
2011
148views more  SIAMSC 2011»
13 years 4 months ago
Bootstrap AMG
We develop an algebraic multigrid (AMG) setup scheme based on the bootstrap framework for multiscale scientific computation. Our approach uses a weighted least squares definition...
Achi Brandt, James J. Brannick, K. Kahl, Irene Liv...
TCOM
2011
122views more  TCOM 2011»
13 years 4 months ago
Relay Station Placement Strategy in IEEE 802.16j WiMAX Networks
Abstract—In this paper, we study the relay station (RS) placement strategy in IEEE 802.16j WiMAX networks. Specifically, the impact of RS placement on IEEE 802.16j network perfo...
Hsiao-Chen Lu, Wanjiun Liao, Frank Yeong-Sung Lin
ICASSP
2011
IEEE
13 years 1 months ago
WinDSK8: A user interface for the OMAP-L138 DSP board
A new multi-core DSP board is available for university and industry engineers. The LogicPD ZoomTM OMAP-L138 eXperimenter Kit, featuring Texas Instruments’ dual core SoC (ARM9 an...
Michael G. Morrow, Cameron H. G. Wright, Thad B. W...
GI
2003
Springer
14 years 3 months ago
C versus Ada in sicherheitskritischen Applikationen
: In Zukunft wird es verstärkt notwendig sein, sicherheitskritische Systeme statt in Ada in der Programmiersprache C zu implementieren. Die Verwendung von C ist getrieben vom Mang...
Michael Jungmann
« Prev « First page 3019 / 3157 Last » Next »