Sciweavers

136 search results - page 16 / 28
» The Category Theoretic Solution of Recursive Program Schemes
Sort
View
152
Voted
DIALM
2005
ACM
130views Algorithms» more  DIALM 2005»
15 years 5 months ago
On lower bounds for MAC layer contention in CSMA/CA-based wireless networks
Wireless LANs operating within unlicensed frequency bands require random access schemes such as CSMA/CA, so that wireless networks from different administrative domains (for exam...
Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt
160
Voted
SIGMETRICS
2003
ACM
199views Hardware» more  SIGMETRICS 2003»
15 years 8 months ago
Data cache locking for higher program predictability
Caches have become increasingly important with the widening gap between main memory and processor speeds. However, they are a source of unpredictability due to their characteristi...
Xavier Vera, Björn Lisper, Jingling Xue
106
Voted
JSAC
2006
100views more  JSAC 2006»
15 years 3 months ago
Analysis and optimization of CDMA systems with chip-level interleavers
Abstract--In this paper, we present an unequal power allocation technique to increase the throughput of code-division multiple-access (CDMA) systems with chip-level interleavers. P...
Lihai Liu, Jun Tong, Li Ping
GECCO
2005
Springer
114views Optimization» more  GECCO 2005»
15 years 9 months ago
Exploiting disruption aversion to control code bloat
The authors employ multiple crossovers as a novel natural extension to crossovers as a mixing operator. They use this as a framework to explore the ideas of code growth. Empirical...
Jason Stevens, Robert B. Heckendorn, Terence Soule
TLDI
2005
ACM
102views Formal Methods» more  TLDI 2005»
15 years 9 months ago
An open and shut typecase
Two different ways of defining ad-hoc polymorphic operations commonly occur in programming languages. With the first form polymorphic operations are defined inductively on the...
Dimitrios Vytiniotis, Geoffrey Washburn, Stephanie...