Sciweavers

16190 search results - page 2718 / 3238
» Applicative programming with effects
Sort
View
MOBICOM
1999
ACM
15 years 8 months ago
Reversing the Collision-Avoidance Handshake in Wireless Networks
Many medium-access control (MAC) protocols for wireless networks proposed or implemented to date are based on collisionavoidance handshakes between sender and receiver. In the vas...
J. J. Garcia-Luna-Aceves, Asimakis Tzamaloukas
DFT
1999
IEEE
114views VLSI» more  DFT 1999»
15 years 8 months ago
Yield Enhancement Considerations for a Single-Chip Multiprocessor System with Embedded DRAM
A programmable single-chip multiprocessor system for video coding has been developed. The system is implemented in a high-performance 0.25 m logic/embedded DRAM process. It integr...
Markus Rudack, Dirk Niggemeyer
SIGCPR
1999
ACM
177views Hardware» more  SIGCPR 1999»
15 years 8 months ago
Interrogative theory of information and knowledge
This report offers an interrogative-based approach to differentiating and quantifying information and knowledge within text. We examine the work of Popper, Shannon, Weaver, Brooke...
Edward J. Quigley, Anthony Debons
SIGMOD
1999
ACM
94views Database» more  SIGMOD 1999»
15 years 8 months ago
Logical Logging to Extend Recovery to New Domains
Recovery can be extended to new domains at reduced logging cost by exploiting "logical" log operations. During recovery, a logical log operation may read data values fro...
David B. Lomet, Mark R. Tuttle
ICCAD
1999
IEEE
108views Hardware» more  ICCAD 1999»
15 years 8 months ago
Copy detection for intellectual property protection of VLSI designs
We give the first study of copy detection techniques for VLSI CAD applications; these techniques are complementary to previous watermarking-based IP protection methods in finding ...
Andrew B. Kahng, Darko Kirovski, Stefanus Mantik, ...
« Prev « First page 2718 / 3238 Last » Next »