Sciweavers

8322 search results - page 1533 / 1665
» What Are We Looking for
Sort
View
JSYML
1998
61views more  JSYML 1998»
13 years 9 months ago
Superdestructibility: A Dual to Laver's Indestructibility
Abstract. After small forcing, any <κ-closed forcing will destroy the supercompactness and even the strong compactness of κ. In a delightful argument, Laver [L78] proved that ...
Joel David Hamkins, Saharon Shelah
MONET
2002
155views more  MONET 2002»
13 years 9 months ago
A Prioritized Real-Time Wireless Call Degradation Framework for Optimal Call Mix Selection
This paper describes a framework for selecting the optimal call mix to be admitted while employing a bandwidth degradation policy in a wireless cellular network. The optimal proper...
Gergely V. Záruba, Imrich Chlamtac, Sajal K...
NAR
2002
141views more  NAR 2002»
13 years 9 months ago
Co-expression pattern from DNA microarray experiments as a tool for operon prediction
The prediction of operons, the smallest unit of transcription in prokaryotes, is the first step towards reconstruction of a regulatory network at the whole genome level. Sequence ...
Chiara Sabatti, Lars Rohlin, Min-Kyu Oh, James C. ...
CORR
2010
Springer
101views Education» more  CORR 2010»
13 years 8 months ago
Spectrum Sharing as Spatial Congestion Games
—In this paper, we present and analyze the properties of a new class of games - the spatial congestion game (SCG), which is a generalization of the classical congestion game (CG)...
Sahand Haji Ali Ahmad, Cem Tekin, Mingyan Liu, Ric...
ESEM
2010
ACM
13 years 8 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
« Prev « First page 1533 / 1665 Last » Next »