Sciweavers

4511 search results - page 722 / 903
» Observation Based System Security
Sort
View
144
Voted
MOBIHOC
2008
ACM
16 years 3 months ago
On the need for bidirectional coupling of road traffic microsimulation and network simulation
Simulation of network protocol behavior in Vehicular Ad Hoc Network (VANET) scenarios is strongly demanded for evaluating the applicability of developed network protocols. In this...
Christoph Sommer, Zheng Yao, Reinhard German, Falk...
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 10 months ago
On Uplink Network MIMO under a Constrained Backhaul and Imperfect Channel Knowledge
Abstract— It is known that next generation mobile comunications systems will most likely employ multi-cell signal processing often referred to as network MIMO - in order to impro...
Patrick Marsch, Gerhard Fettweis
124
Voted
WCRE
2009
IEEE
15 years 10 months ago
An Empirical Study on Inconsistent Changes to Code Clones at Release Level
—Current research on code clones tries to address the question whether or not code clones are harmful for the quality of software. As most of these studies are based on the fine...
Nicolas Bettenburg, Weiyi Shang, Walid Ibrahim, Br...
ACMSE
2009
ACM
15 years 10 months ago
Ginger: implementing a new Lisp family syntax
In this paper we introduce G-expressions, a new syntax based on the S-expression syntax utilized by most Lisp family languages. We have implemented a new homoiconic language, Ging...
James Dean Palmer
LICS
2007
IEEE
15 years 9 months ago
Strong Normalization as Safe Interaction
When enriching the λ-calculus with rewriting, union types may be needed to type all strongly normalizing terms. However, with rewriting, the elimination rule (∨ E) of union typ...
Colin Riba