Sciweavers

345 search results - page 23 / 69
» When Systems Loose their Identity
Sort
View
IOR
2007
65views more  IOR 2007»
13 years 10 months ago
A Comparison of the Optimal Costs of Two Canonical Inventory Systems
We compare two inventory systems, one in which excess demand is lost and the other in which excess demand is backordered. Both systems are reviewed periodically. They experience t...
Ganesh Janakiraman, Sridhar Seshadri, J. George Sh...
SAC
2003
ACM
14 years 3 months ago
Validation of Code-Improving Transformations for Embedded Systems
Programmers of embedded systems often develop software in assembly code due to inadequate support from compilers and the need to meet critical speed and/or space constraints. Many...
Robert van Engelen, David B. Whalley, Xin Yuan
ICC
2007
IEEE
186views Communications» more  ICC 2007»
13 years 11 months ago
On Channel Coding Selection in Time-Slotted ALOHA Packetized Multiple-Access Systems Over Rayleigh Fading Channels
— In this paper, we consider the time-slotted ALOHA packetized multiple-access system where the transmission channels obey i.i.d (independent identically distributed) Rayleigh fa...
Chen Wei, Pingyi Fan, Khaled Ben Letaief
IJFCS
2006
77views more  IJFCS 2006»
13 years 10 months ago
Spike Trains in Spiking Neural P Systems
We continue here the study of the recently introduced spiking neural P systems, which mimic the way that neurons communicate with each other by means of short electrical impulses, ...
Gheorghe Paun, Mario J. Pérez-Jiméne...
ISMIR
2004
Springer
173views Music» more  ISMIR 2004»
14 years 3 months ago
Stochastic Model of a Robust Audio Fingerprinting System
An audio fingerprint is a compact representation of the perceptually relevant parts of audio content. A suitable audio fingerprint can be used to identify audio files, even if ...
Peter Jan O. Doets, Reginald L. Lagendijk