Sciweavers

1307 search results - page 113 / 262
» Follow the intellectual property
Sort
View
RECONFIG
2008
IEEE
107views VLSI» more  RECONFIG 2008»
15 years 8 months ago
Fast Implementation of a Bio-inspired Model for Decentralized Gathering
In the context of the emergence of alternative computing resources to address the challenge of the upcoming end of Moore’s law, we consider the feasibility of gathering computat...
Bernard Girau, Cesar Torres-Huitzil
WCNC
2008
IEEE
15 years 8 months ago
Simulation of Doubly-Selective Compound K Fading Channels for Mobile-to-Mobile Communications
A computer simulation model is proposed for discretetime doubly-selective compound-K fading channel. It first generates multiple independent mobile-to-mobile Rayleigh fading Chan...
Yuan Liu, Jian Zhang, Yahong Rosa Zheng
ISCAS
2007
IEEE
114views Hardware» more  ISCAS 2007»
15 years 8 months ago
On the Suitability of Discrete-Time Receivers for Software-Defined Radio
—CMOS radio receiver architectures, based on radio frequency (RF) sampling followed by discrete-time (D-T) signal processing via switched-capacitor circuits, have recently been p...
Zhiyu Ru, Eric A. M. Klumperink, Bram Nauta
SEFM
2007
IEEE
15 years 8 months ago
Verifying the Mondex Case Study
The Mondex Case study is still the most substantial contribution to the Grand Challenge repository. It has been the target of a number of formal verification efforts. Those effor...
Peter H. Schmitt, Isabel Tonin
TASE
2007
IEEE
15 years 8 months ago
Design of a Certifying Compiler Supporting Proof of Program Safety
Safety is an important property of high-assurance software, and one of the hot research topics on it is the verification method for software to meet its safety policies. In our p...
Yiyun Chen, Lin Ge, Baojian Hua, Zhaopeng Li, Chen...