Sciweavers

26354 search results - page 54 / 5271
» How we refactor, and how we know it
Sort
View
VTC
2010
IEEE
150views Communications» more  VTC 2010»
13 years 7 months ago
Optimizing Training-Based MIMO Systems: How Much Time is Needed for Actual Transmission?
—We study the design of training-based multiple-input multiple-output systems in two block-wise transmission schemes. The conventional transmission scheme has a fixed amount of ...
Xiangyun Zhou, Parastoo Sadeghi, Tharaka A. Lamahe...
BIRTHDAY
2012
Springer
12 years 4 months ago
How to Read a Signature?
In this note we describe a cryptographic curiosity: readable messages that carry their own digital signature.
Vanessa Gratzer, David Naccache
ENTCS
2006
144views more  ENTCS 2006»
13 years 9 months ago
Infinitary Howe's Method
Howe's method is a well-known technique for proving that various kinds of applicative bisimilarity (or similarity) on a functional language are congruences (or precongruences...
Paul Blain Levy
NAACL
2007
13 years 10 months ago
Automatic Answer Typing for How-Questions
We introduce an answer typing strategy specific to quantifiable how questions. Using the web as a data source, we automatically collect answer units appropriate to a given how-q...
Christopher Pinchak, Shane Bergsma
ICSM
2008
IEEE
14 years 3 months ago
Traceability for the maintenance of secure software
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
Yijun Yu, Jan Jürjens, John Mylopoulos