Sciweavers

811 search results - page 133 / 163
» Refactoring Using Type Constraints
Sort
View
TON
2008
86views more  TON 2008»
13 years 8 months ago
Securing user-controlled routing infrastructures
Designing infrastructures that give untrusted third parties (such as end-hosts) control over routing is a promising research direction for achieving flexible and efficient communic...
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...
TWC
2008
120views more  TWC 2008»
13 years 8 months ago
Energy minimization of a QAM system with fading
In this paper, the problem of choosing constellation size and transmit power that minimizes the energy-per-goodbit in a frequency-flat, long-term static fading channel is considere...
Raghavendra S. Prabhu, Babak Daneshrad
CORR
2004
Springer
129views Education» more  CORR 2004»
13 years 8 months ago
On Generalized Records and Spatial Conjunction in Role Logic
We have previously introduced role logic as a notation for describing properties of relational structures in shape analysis, databases and knowledge bases. A natural fragment of ro...
Viktor Kuncak, Martin C. Rinard
VLC
2002
99views more  VLC 2002»
13 years 8 months ago
Flexible Graph Layout for the Web
More powerful personal computers and higher network bandwidth has meant that graphics has become increasingly important on the web. Graph-based diagrams are one of the most import...
Trevor Hansen, Kim Marriott, Bernd Meyer, Peter J....
ICRA
2010
IEEE
138views Robotics» more  ICRA 2010»
13 years 7 months ago
Mapping indoor environments based on human activity
— We present a novel approach to build approximate maps of structured environments utilizing human motion and activity. Our approach uses data recorded with a data suit which is ...
Slawomir Grzonka, Frederic Dijoux, Andreas Karwath...