Sciweavers

152 search results - page 3 / 31
» An Examination of Forward Volatility
Sort
View
IJCAI
1989
14 years 11 months ago
A New Metaphor for the Graphical Explanation of Forward-Chaining Rule Execution
: This paper describes a novel method for displaying and examining the execution space of a rule interpreter. This method provides both coarse-grained and fine-grained views. The c...
John Domingue, Marc Eisenstadt
GLOBECOM
2009
IEEE
15 years 4 months ago
On the Performance of Compressed Interference Forwarding for Uplink Base Station Cooperation
Abstract—The capacity of today’s cellular mobile communications systems is mainly limited by inter-cell interference. Multi-cell joint transmission or joint detection schemes a...
Michael Grieger, Patrick Marsch, Gerhard Fettweis,...
ARCS
1997
Springer
15 years 1 months ago
A RISC Processor with Extended Forwarding
The paper examines a simple conceptual modification of the operation unit of a RISC processor. We propose to substitute a part of the conventional general purpose register file by...
Gert Markwardt, Günter Kemnitz, Rainer G. Spa...
VLDB
1993
ACM
94views Database» more  VLDB 1993»
15 years 1 months ago
Update Logging for Persistent Programming Languages: A Comparative Performance Evaluation
If persistent programming languages are to be accepted they must provide many of the standard features of traditional database systems, including resilience in the face of system ...
Antony L. Hosking, Eric W. Brown, J. Eliot B. Moss
IJNSEC
2008
120views more  IJNSEC 2008»
14 years 9 months ago
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy
For an identity-based authenticated key agreement (IDAK) protocol, PKG forward secrecy is the strongest notion of forward secrecy, which is about the security of previously establ...
Shengbao Wang, Zhenfu Cao, Feng Cao