Sciweavers

305 search results - page 54 / 61
» From Sets to Bits in Coq
Sort
View
TWC
2010
13 years 5 months ago
Efficient Spectrum Leasing via Randomized Silencing of Secondary Users
In this paper, a primary (licensed) user leases part of its resources to independent secondary (unlicensed) terminals in exchange for a tariff in dollars per bit, under the constra...
Rocco Di Taranto, Petar Popovski, Osvaldo Simeone,...
HIPEAC
2011
Springer
12 years 10 months ago
Decoupled zero-compressed memory
For each computer system generation, there are always applications or workloads for which the main memory size is the major limitation. On the other hand, in many cases, one could...
Julien Dusser, André Seznec
KDD
2009
ACM
364views Data Mining» more  KDD 2009»
14 years 11 months ago
Causality quantification and its applications: structuring and modeling of multivariate time series
Time series prediction is an important issue in a wide range of areas. There are various real world processes whose states vary continuously, and those processes may have influenc...
Takashi Shibuya, Tatsuya Harada, Yasuo Kuniyoshi
DIGRA
2005
Springer
14 years 4 months ago
Connecting Worlds. Fantasy Role-Playing Games, Ritual Acts and the Magic Circle
From a cultural history and game theoretical perspective my work focuses on the relationship between the fantasy subculture, fantasy role-playing games and the daily life of their...
Marinka Copier
ASIAN
2004
Springer
150views Algorithms» more  ASIAN 2004»
14 years 4 months ago
Concurrent Constraint-Based Memory Machines: A Framework for Java Memory Models
A central problem in extending the von Neumann architecture to petaflop computers with millions of hardware threads and with a shared memory is defining the memory model [Lam79,...
Vijay A. Saraswat