Sciweavers

492 search results - page 94 / 99
» Exploring Recovery from Operating System Lockups
Sort
View
POPL
2008
ACM
14 years 8 months ago
Boomerang: resourceful lenses for string data
A lens is a bidirectional program. When read from left to right, it denotes an ordinary function that maps inputs to outputs. When read from right to left, it denotes an "upd...
Aaron Bohannon, J. Nathan Foster, Benjamin C. Pier...
BMCBI
2006
122views more  BMCBI 2006»
13 years 8 months ago
BioMoby extensions to the Taverna workflow management and enactment software
Background: As biology becomes an increasingly computational science, it is critical that we develop software tools that support not only bioinformaticians, but also bench biologi...
Edward A. Kawas, Martin Senger, Mark D. Wilkinson
JNW
2008
77views more  JNW 2008»
13 years 8 months ago
Datacasting In The Mobile Environment
Datacasting employs the excess bandwidth from digital television signals for use in one-way data transmission, and it is being used successfully for high-speed downloads at fixed l...
Kent Chamberlin, Benjamin McMahon, Scott Valcourt
TWC
2008
105views more  TWC 2008»
13 years 8 months ago
Receive Antenna Array Strategies in Fading and Interference: An Outage Probability Comparison
We explore tradeoffs between different reception strategies of multiple receive antennas in fading channels with co-channel interference (CCI). Our tradeoff analysis is based on ou...
Juan M. Romero-Jerez, Andrea J. Goldsmith
SIGSOFT
2007
ACM
14 years 8 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska