Sciweavers

11211 search results - page 2085 / 2243
» Rank-Sensitive Data Structures
Sort
View
128
Voted
JNW
2006
86views more  JNW 2006»
15 years 1 months ago
Throughput and Delay Analysis of Unslotted IEEE 802.15.4
The IEEE 802.15.4 standard is designed as a low power and low data rate protocol offering high reliability. It defines a beaconed and unbeaconed version. In this work, we analyze t...
Benoît Latré, Pieter De Mil, Ingrid M...
108
Voted
ENTCS
2007
174views more  ENTCS 2007»
15 years 1 months ago
Quantum Patterns and Types for Entanglement and Separability
As a first step toward a notion of quantum data structures, we introduce a typing system for reflecting entanglement and separability. This is presented in the context of classi...
Simon Perdrix
105
Voted
ENTCS
2007
113views more  ENTCS 2007»
15 years 1 months ago
The Interactive Curry Observation Debugger iCODE
Debugging by observing the evaluation of expressions and functions is a useful approach for finding bugs in lazy functional and functional logic programs. However, adding and rem...
Parissa H. Sadeghi, Frank Huch
92
Voted
ENTCS
2007
100views more  ENTCS 2007»
15 years 1 months ago
Type-Safe Code Transformations in Haskell
The use of typed intermediate languages can significantly increase the reliability of a compiler. By typechecking the code produced at each transformation stage, one can identify...
Louis-Julien Guillemette, Stefan Monnier
124
Voted
JSAC
2006
131views more  JSAC 2006»
15 years 1 months ago
On Dynamic Optimization of Packet Matching in High-Speed Firewalls
Abstract--Packet matching plays a critical role in the performance of many network devices and a tremendous amount of research has already been invested to come up with better opti...
Hazem Hamed, Adel El-Atawy, Ehab Al-Shaer
« Prev « First page 2085 / 2243 Last » Next »