Sciweavers

598 search results - page 47 / 120
» Typing the Numeric Tower
Sort
View
VALUETOOLS
2006
ACM
112views Hardware» more  VALUETOOLS 2006»
14 years 2 months ago
Performance of ad hoc networks with two-hop relay routing and limited packet lifetime
— Considered is a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing protocol. Packets at relay no...
Ahmad Al Hanbali, Philippe Nain, Eitan Altman
COMPSAC
2005
IEEE
14 years 2 months ago
Availability Evaluation of Hardware/Software Systems with Several Recovery Procedures
The use of several distinct recovery procedures is one of the techniques that can be used to ensure high availability and fault-tolerance of computer systems. This method has been...
Sergiy A. Vilkomir, David Lorge Parnas, Veena B. M...
DEEC
2005
IEEE
14 years 2 months ago
Ontologizing EDI: First Steps and Initial Experience
Electronic Data Interchange (EDI) standards for transmission of business messages were promulgated in the 1970s. As standards became more complex to provide additional message typ...
Douglas Foxvog, Christoph Bussler
VRML
2005
ACM
14 years 2 months ago
Web-based progressive geometry transmission using subdivision-surface wavelets
Web-based geometry transmission profits from a transmission system, which is both progressive and compressive. For this application, the wavelet transform has emerged as a suitab...
Jens Jessl, Martin Bertram, Hans Hagen
ISSAC
2005
Springer
125views Mathematics» more  ISSAC 2005»
14 years 2 months ago
Generalized normal forms and polynomial system solving
This paper describes a new method for computing the normal form of a polynomial modulo a zero-dimensional ideal I. We give a detailed description of the algorithm, a proof of its ...
Bernard Mourrain