Sciweavers

453 search results - page 66 / 91
» From restrictive to prescriptive design
Sort
View
144
Voted
DAC
2006
ACM
16 years 4 months ago
Games are up for DVFS
Graphics-intensive computer games are no longer restricted to highperformance desktops, but are also available on a variety of portable devices ranging from notebooks to PDAs and ...
Yan Gu, Samarjit Chakraborty, Wei Tsang Ooi
123
Voted
ICC
2008
IEEE
116views Communications» more  ICC 2008»
15 years 10 months ago
Nonlinear Turbo Codes for Higher-Order Modulations
— In 1982 Ungerboeck presented a set-partitioning design technique for trellis coded modulation (TCM). Although this technique directly assigns constellation points to the branch...
Miguel Griot, Andres I. Vila Casado, Richard D. We...
120
Voted
TOOLS
2008
IEEE
15 years 10 months ago
Controlling Accessibility in Agile Projects with the Access Modifier Modifier
Access modifiers like public and private let the programmer control the accessibility of class members. Restricted accessibility supports encapsulation, i.e., the hiding of impleme...
Philipp Bouillon, Eric Großkinsky, Friedrich...
118
Voted
ISAAC
2004
Springer
115views Algorithms» more  ISAAC 2004»
15 years 9 months ago
Randomized Algorithms for Motif Detection
Motivation: Motif detection for DNA sequences has many important applications in biological studies, e.g., locating binding sites and regulatory signals, and designing genetic prob...
Lusheng Wang, Liang Dong, Hui Fan
156
Voted
POPL
2012
ACM
13 years 11 months ago
Programming with binders and indexed data-types
We show how to combine a general purpose type system for an existing language with support for programming with binders and contexts by refining the type system of ML with a rest...
Andrew Cave, Brigitte Pientka