Sciweavers

199 search results - page 37 / 40
» The Residue Logarithmic Number System: Theory and Implementa...
Sort
View
80
Voted
ICFP
2008
ACM
15 years 9 months ago
Functional netlists
In efforts to overcome the complexity of the syntax and the lack of formal semantics of conventional hardware description languages, a number of functional hardware description la...
Sungwoo Park, Jinha Kim, Hyeonseung Im
FC
2009
Springer
104views Cryptology» more  FC 2009»
15 years 4 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
CISS
2007
IEEE
15 years 3 months ago
Differential Space-Frequency Group Codes for MIMO-OFDM
— In recent years, coherent space-frequency (SF) coded multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) systems have attracted great attentio...
Engin Zeydan, Ufuk Tureli
100
Voted
SIGCOMM
2004
ACM
15 years 2 months ago
Sizing router buffers
All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algor...
Guido Appenzeller, Isaac Keslassy, Nick McKeown
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
15 years 2 months ago
Spreadsheet as a relational database engine
Spreadsheets are among the most commonly used applications for data management and analysis. Perhaps they are even among the most widely used computer applications of all kinds. H...
Jerzy Tyszkiewicz