Sciweavers

8695 search results - page 1352 / 1739
» Making the Complex Simple
Sort
View
SYNTHESE
2010
59views more  SYNTHESE 2010»
15 years 3 months ago
Frege's Begriffsschrift as a lingua characteristica
In this paper I suggest an answer to the question of what Frege means when he says that his logical system, the Begriffsschrift, is like the language Leibniz sketched, a lingua ch...
Tapio Korte
TVCG
2010
153views more  TVCG 2010»
15 years 3 months ago
A Visual Analytics Approach to Understanding Spatiotemporal Hotspots
As data sources become larger and more complex, the ability to effectively explore and analyze patterns amongst varying sources becomes a critical bottleneck in analytic reasoning...
Ross Maciejewski, Stephen Rudolph, Ryan Hafen, Ahm...
VTC
2010
IEEE
136views Communications» more  VTC 2010»
15 years 3 months ago
Performance of the LTE Uplink with Intra-Site Joint Detection and Joint Link Adaptation
—We evaluate the performance of the uplink of a 3GPP UTRAN Long Term Evolution (LTE) system with intra-site cooperation, where different sectors belonging to the same site may co...
Andreas Müller, Philipp Frank, Joachim Speide...
WALCOM
2010
IEEE
221views Algorithms» more  WALCOM 2010»
15 years 3 months ago
Variants of Spreading Messages
In a distributed computing environment a faulty node could lead other nodes in the system to behave in a faulty manor. An initial set of faults could make all the nodes in the syst...
T. V. Thirumala Reddy, D. Sai Krishna, C. Pandu Ra...
ACSAC
2010
IEEE
15 years 2 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
« Prev « First page 1352 / 1739 Last » Next »