Sciweavers

1560 search results - page 88 / 312
» Order Functions and Evaluation Codes
Sort
View

Book
19360views
15 years 9 months ago
Numerical Recipes in C
C code implementation of several math algorithms such as Linear Algebraic Equations, Interpolation and Extrapolation, Integration of Functions, Evaluation of Functions, Random Num...
William H. Press, Saul A. Teukolsky, William T. Ve...
WCC
2005
Springer
156views Cryptology» more  WCC 2005»
14 years 3 months ago
One and Two-Variable Interlace Polynomials: A Spectral Interpretation
We relate the one- and two-variable interlace polynomials of a graph to the spectra of a quadratic boolean function with respect to a strategic subset of local unitary transforms. ...
Constanza Riera, Matthew G. Parker
SOSP
2003
ACM
14 years 7 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
ESOP
2006
Springer
14 years 1 months ago
Embedding Dynamic Dataflow in a Call-by-Value Language
This paper describes FrTime, an extension of Scheme designed for writing interactive applications. Inspired by functional reactive programming, the language embeds dynamic dataflow...
Gregory H. Cooper, Shriram Krishnamurthi
COMCOM
2008
100views more  COMCOM 2008»
13 years 10 months ago
The impact of code allocation on the multiple access interference in WCDMA systems
Code allocation has a significant impact on the performance of Code Division Multiple Access (CDMA) systems. For the uplink direction, in 3G Wideband CDMA (WCDMA) cellular systems...
Thamer Al-Meshhadany, Wessam Ajib