Sciweavers

75 search results - page 15 / 15
» Modeling Crosstalk Induced Delay
Sort
View
MSR
2010
ACM
13 years 6 months ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie
JSAC
2007
120views more  JSAC 2007»
13 years 4 months ago
On the Capacity of MIMO Wireless Channels with Dynamic CSIT
Abstract— Transmit channel side information (CSIT) can significantly increase MIMO wireless capacity. Due to delay in acquiring this information, however, the time-selective fad...
Mai Vu, Arogyaswami Paulraj
MMNS
2001
151views Multimedia» more  MMNS 2001»
13 years 6 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
CIKM
2006
Springer
13 years 8 months ago
Multi-evidence, multi-criteria, lazy associative document classification
We present a novel approach for classifying documents that combines different pieces of evidence (e.g., textual features of documents, links, and citations) transparently, through...
Adriano Veloso, Wagner Meira Jr., Marco Cristo, Ma...
TCAD
2010
88views more  TCAD 2010»
12 years 11 months ago
Stress Aware Layout Optimization Leveraging Active Area Dependent Mobility Enhancement
Starting from the 90nm technology node, process induced stress has played a key role in the design of highperformance devices. The emergence of source/drain silicon germanium (S/D ...
Ashutosh Chakraborty, Sean X. Shi, David Z. Pan