Sciweavers

677 search results - page 126 / 136
» Dependent Types from Counterexamples
Sort
View
DATE
2006
IEEE
78views Hardware» more  DATE 2006»
15 years 4 months ago
Wireless sensor networks and beyond
—Wireless Sensor Networks provide opportunities even outside their usual application domain of environmental monitoring. In this paper we present a case study on the use of Wirel...
Paul J. M. Havinga
VTC
2006
IEEE
114views Communications» more  VTC 2006»
15 years 4 months ago
A Scheduling Scheme under a Ratio Constraint for the Multiuser MIMO Systems
A scheduling scheme for MIMO systems which has the capability of obtaining multiuser diversity gain and controlling the link connection ratio among users simultaneously is proposed...
Jiwon Kang, Hakju Lee, Chungyong Lee, Young Yong K...
MSR
2006
ACM
15 years 3 months ago
Mining large software compilations over time: another perspective of software evolution
With the success of libre (free, open source) software, a new type of software compilation has become increasingly common. Such compilations, often referred to as ‘distributions...
Gregorio Robles, Jesús M. González-B...
MSR
2006
ACM
15 years 3 months ago
Detecting similar Java classes using tree algorithms
Similarity analysis of source code is helpful during development to provide, for instance, better support for code reuse. Consider a development environment that analyzes code whi...
Tobias Sager, Abraham Bernstein, Martin Pinzger, C...
DSN
2005
IEEE
15 years 3 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...