Sciweavers

1629 search results - page 79 / 326
» Infeasible Code Detection
Sort
View
ECSCW
2007
14 years 11 months ago
Semi-Synchronous Conflict Detection and Resolution in Asynchronous Software Development
Previous work has found that (a) when software is developed collaboratively, concurrent accesses to related pieces of code are made, and (b) when these accesses are coordinated asy...
Prasun Dewan, Rajesh Hegde
TIT
1998
93views more  TIT 1998»
14 years 9 months ago
Multihead Detection for Multitrack Recording Channels
— We look at multiple-track detection for magnetic recording systems that use array heads to write and read over multiple tracks simultaneously. The recording channel is modeled ...
Emina Soljanin, Costas N. Georghiades
IJNSEC
2007
154views more  IJNSEC 2007»
14 years 9 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
ADHOCNOW
2005
Springer
15 years 3 months ago
Reed-Solomon and Hermitian Code-Based Scheduling Protocols for Wireless Ad Hoc Networks
Abstract. In this work we investigate bounds on throughput and delay performance of a scheduling protocol that derives its decisions from codes traditionally used to correct or det...
Carlos H. Rentel, Thomas Kunz
ICS
1999
Tsinghua U.
15 years 2 months ago
High-level semantic optimization of numerical codes
This paper presents a mathematical framework to exploit the semantic properties of matrix operations in loop-based numerical codes. The heart of this framework is an algebraic lan...
Vijay Menon, Keshav Pingali