Sciweavers

1145 search results - page 171 / 229
» The Correctness of an Optimized Code Generation
Sort
View
JCM
2008
77views more  JCM 2008»
14 years 11 months ago
In-Field Attack Proof of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detec...
Zheng Wang, Xiaodong Lee, Xinchang Zhang, Baoping ...
LISP
2006
160views more  LISP 2006»
14 years 11 months ago
Formal compiler construction in a logical framework
The task of designing and implementing a compiler can be a difficult and error-prone process. In this paper, we present a new approach based on the igher-order abstract syntax and ...
Jason Hickey, Aleksey Nogin
VTC
2010
IEEE
125views Communications» more  VTC 2010»
14 years 10 months ago
Single-Carrier Hybrid ARQ Using Joint Transmit/Receive MMSE-FDE
—In the next generation high-speed wireless packet access systems, hybrid automatic repeat request (HARQ) is necessary to achieve higher throughput performance. An HARQ with Chas...
Kazuki Takeda, Fumiyuki Adachi
TWC
2008
127views more  TWC 2008»
14 years 11 months ago
Energy-Delay Analysis of MAC Protocols in Wireless Networks
In this paper the tradeoff between energy and delay for wireless networks is studied. A network using a request-to-send (RTS) and clear-to-send (CTS) type medium access control (M...
Shih Yu Chang, Wayne E. Stark, Achilleas Anastasop...
IWMM
1998
Springer
130views Hardware» more  IWMM 1998»
15 years 4 months ago
Comparing Mostly-Copying and Mark-Sweep Conservative Collection
Many high-level language compilers generate C code and then invoke a C compiler for code generation. To date, most of these compilers link the resulting code against a conservativ...
Frederick Smith, J. Gregory Morrisett