Sciweavers

787 search results - page 122 / 158
» Source code analysis and manipulation
Sort
View
GLOBECOM
2008
IEEE
14 years 4 months ago
Characterization of Relay Channels Using the Bhattacharyya Parameter
—Relay systems have large and complex parameter spaces, which makes it difficult to determine the parameter region where the system achieves a given performance criterion, such ...
Josephine P. K. Chu, Andrew W. Eckford, Raviraj S....
GLOBECOM
2007
IEEE
14 years 4 months ago
Volume Growth and General Rate Quantization on Grassmann Manifolds
—The Grassmann manifold Gn,p (L) is the set of all p-dimensional planes (through the origin) in the n-dimensional Euclidean space Ln , where L is either R or C. This paper consid...
Wei Dai, Brian Rider, Youjian Liu
GLOBECOM
2007
IEEE
14 years 4 months ago
Two-Hop Two-Path Voice Communications Over a Mobile Ad-Hoc Network
Abstract— We consider two-hop communication of a delaysensitive, memoryless Gaussian source over two independent paths in an ad-hoc network. To capture the behavior an ad-hoc net...
Jagadeesh Balam, Jerry D. Gibson
IWPC
2007
IEEE
14 years 4 months ago
Tracking Objects to Detect Feature Dependencies
The domain-specific ontology of a software system includes a set of features and their relationships. While the problem of locating features in object-oriented programs has been ...
Adrian Lienhard, Orla Greevy, Oscar Nierstrasz
DCOSS
2005
Springer
14 years 3 months ago
Routing Explicit Side Information for Data Compression in Wireless Sensor Networks
Abstract. Two difficulties in designing data-centric routes [2–5] in wireless sensor networks are the lack of reasonably practical data aggregation models and the high computatio...
Huiyu Luo, Gregory J. Pottie