Results 1 to 10 of about 1,169,291 (287)
Eugenio R. Luján
semanticscholar +4 more sources
Many countries have allocated new frequency bands for fifth generation (5G) communication systems. In this paper, a wideband continuous class-F (CCF) radio frequency power amplifier (RFPA) is presented for the new 5G frequency band, from 3.3 GHz to 4.3 ...
Md. Golam Sadeque +5 more
doaj +2 more sources
In order to implement the fifth generation (5G) communication system for a large number of users, the governments of many countries nominated the low 5G frequency band between 3.3 and 4.3 GHz.
Md Golam Sadeque +7 more
doaj +2 more sources
Circular Proofs as Session-Typed Processes: A Local Validity Condition [PDF]
Proof theory provides a foundation for studying and reasoning about programming languages, most directly based on the well-known Curry-Howard isomorphism between intuitionistic logic and the typed lambda-calculus.
Farzaneh Derakhshan, Frank Pfenning
doaj +1 more source
BIOMARKER LEVEL OF ENDOTHELIAL DYSFUNCTION IN YOUTH 18-21 YEARS WITH ABDOMINAL OBESITY
Обоснование исследования. Эндотелиальная дисфункция, развивающаяся в юношеском возрасте на фоне абдоминального ожирения, может быть причиной ускоренного развития сердечно сосудистых заболеваний во взрослом периоде жизни.
Церцвадзе, Лана Кахаберовна +3 more
semanticscholar +1 more source
A Logical Foundation for Environment Classifiers [PDF]
Taha and Nielsen have developed a multi-stage calculus {\lambda}{\alpha} with a sound type system using the notion of environment classifiers. They are special identifiers, with which code fragments and variable declarations are annotated, and their ...
Takeshi Tsukada, Atsushi Igarashi
doaj +1 more source
Unguarded Recursion on Coinductive Resumptions [PDF]
We study a model of side-effecting processes obtained by starting from a monad modelling base effects and adjoining free operations using a cofree coalgebra construction; one thus arrives at what one may think of as types of non-wellfounded side ...
Sergey Goncharov +3 more
doaj +1 more source
Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying
Thomas Jensen +2 more
doaj +1 more source
Logical Step-Indexed Logical Relations [PDF]
Appel and McAllester's "step-indexed" logical relations have proven to be a simple and effective technique for reasoning about programs in languages with semantically interesting types, such as general recursive types and general reference types. However,
Derek Dreyer, Amal Ahmed, Lars Birkedal
doaj +1 more source
Refining Inductive Types [PDF]
Dependently typed programming languages allow sophisticated properties of data to be expressed within the type system. Of particular use in dependently typed programming are indexed types that refine data by computationally useful information.
Robert Atkey +2 more
doaj +1 more source

