Sciweavers

1740 search results - page 292 / 348
» A Digital Archive of Research Papers in Computer Science
Sort
View
JLP
2007
95views more  JLP 2007»
15 years 1 months ago
Model checking a cache coherence protocol of a Java DSM implementation
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. It aims to implement Java’s memory model and allows multithreaded Java progr...
Jun Pang, Wan Fokkink, Rutger F. H. Hofman, Ronald...
TSP
2010
14 years 8 months ago
A non-iterative technique for phase noise ICI mitigation in packet-based OFDM systems
In this paper, a practical approach for detecting packet-based orthogonal frequency division multiplexing (OFDM) signals in the presence of phase noise is presented. An OFDM packe...
Payam Rabiei, Won Namgoong, Naofal Al-Dhahir
ECOOP
2011
Springer
14 years 1 months ago
An Empirical Study of Object Protocols in the Wild
Abstract. An active area of research in computer science is the prevention of violations of object protocols, i.e., restrictions on temporal orderings of method calls on an object....
Nels E. Beckman, Duri Kim, Jonathan Aldrich
138
Voted
COLT
2008
Springer
15 years 3 months ago
Almost Tight Upper Bound for Finding Fourier Coefficients of Bounded Pseudo- Boolean Functions
A pseudo-Boolean function is a real-valued function defined on {0, 1}n . A k-bounded function is a pseudo-Boolean function that can be expressed as a sum of subfunctions each of w...
Sung-Soon Choi, Kyomin Jung, Jeong Han Kim
BMCBI
2007
209views more  BMCBI 2007»
15 years 1 months ago
SYMBIOmatics: Synergies in Medical Informatics and Bioinformatics - exploring current scientific literature for emerging topics
Background: The SYMBIOmatics Specific Support Action (SSA) is "an information gathering and dissemination activity" that seeks "to identify synergies between the bi...
Dietrich Rebholz-Schuhmann, Graham Cameron, Domini...