Sciweavers

6554 search results - page 1105 / 1311
» Constraint Logic Programming
Sort
View
FUIN
2008
102views more  FUIN 2008»
15 years 3 months ago
Some Aspects of Parsing Expression Grammar
Parsing Expression Grammar (PEG) is a new way to specify syntax, by means of a top-down process with limited backtracking. It can be directly transcribed into a recursive-descent ...
Roman R. Redziejowski
MP
2007
75views more  MP 2007»
15 years 3 months ago
Solving maximum-entropy sampling problems using factored masks
We present a practical approach to Anstreicher and Lee’s masked spectral bound for maximum-entropy sampling, and we describe favorable results that we have obtained with a Branch...
Samuel Burer, Jon Lee
DATE
2010
IEEE
134views Hardware» more  DATE 2010»
15 years 2 months ago
Combining optimizations in automated low power design
—Starting from sequential programs, we present an approach combining data reuse, multi-level MapReduce, and pipelining to automatically find the most power-efficient designs th...
Qiang Liu, Tim Todman, Wayne Luk
174
Voted
JSAC
2008
95views more  JSAC 2008»
15 years 2 months ago
Cognitive Medium Access: Constraining Interference Based on Experimental Models
In this paper we design a cognitive radio that can coexist with multiple parallel WLAN channels while abiding by an interference constraint. The interaction between both systems is...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
JCS
2010
124views more  JCS 2010»
15 years 2 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
« Prev « First page 1105 / 1311 Last » Next »