Sciweavers

2205 search results - page 170 / 441
» Mutation Operators for Specifications
Sort
View
ADHOC
2005
144views more  ADHOC 2005»
13 years 9 months ago
Bluetooth scatternet formation: A survey
This paper describes the issue of piconet interconnection for Bluetooth technology. These larger networks, known as scatternets, have the potential to increase networking flexibil...
Roger M. Whitaker, Leigh E. Hodge, Imrich Chlamtac
ASC
2004
13 years 9 months ago
Efficient fuzzy compiler for SIMD architectures
Abstract. This paper presents a real-time full-programmable fuzzy compiler based on piecewise linear interpolation techniques designed to be executed in SIMD (Single Instruction Mu...
Enrique Frías-Martínez, Julio Guti&e...
CN
2004
106views more  CN 2004»
13 years 9 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
CORR
2002
Springer
81views Education» more  CORR 2002»
13 years 9 months ago
Value withdrawal explanations: a theoretical tool for programming environments
Abstract. Constraint logic programming combines declarativity and efficiency thanks to constraint solvers implemented for specific domains. Value withdrawal explanations have been ...
Willy Lesaint
GRAMMARS
2000
89views more  GRAMMARS 2000»
13 years 9 months ago
Monotonic C-Command: A New Perspective on Tree Adjoining Grammar
In this paper we argue for a reconceptualization of the Tree Adjoining Grammar (TAG) formalism, in which the elementary structures are collections of c-command relations, and the ...
Robert Frank, Seth Kulick, K. Vijay-Shanker