Sciweavers

928 search results - page 139 / 186
» Safety management of complex technology
Sort
View
MKM
2009
Springer
15 years 4 months ago
A Logically Saturated Extension of
This paper presents a proof language based on the work of Sacerdoti Coen [1,2], Kirchner [3] and Autexier [4] on ¯λµ˜µ, a calculus introduced by Curien and Herbelin [5,6]. Jus...
Lionel Elie Mamane, Herman Geuvers, James McKinna
MOBILWARE
2009
ACM
15 years 4 months ago
Middleware Solutions for Self-organizing Multi-hop Multi-path Internet Connectivity Based on Bluetooth
The availability of heterogeneous wireless interfaces and of growing computing resources on widespread portable devices pushes for enabling innovative deployment scenarios where mo...
Paolo Bellavista, Carlo Giannelli
CISS
2008
IEEE
15 years 4 months ago
Distributed detection in the presence of frequency offset and phase shift
— In this paper, we study the problem of distributed detection in the presence of unknown carrier frequency offset (CFO) and initial phase, the issue we encounter in the emerging...
Tao Wu, Qi Cheng
CISS
2008
IEEE
15 years 4 months ago
Near optimal lossy source coding and compression-based denoising via Markov chain Monte Carlo
— We propose an implementable new universal lossy source coding algorithm. The new algorithm utilizes two wellknown tools from statistical physics and computer science: Gibbs sam...
Shirin Jalali, Tsachy Weissman
CISS
2008
IEEE
15 years 4 months ago
Distributed power control in wireless ad hoc networks using message passing: Throughput optimality and network utility maximizat
— This paper presents an algorithm for distributed power control and scheduling over wireless ad hoc-networks, where the data rate on each link depends on the transmission power ...
Aneesh Reddy, Sanjay Shakkottai, Lei Ying