Sciweavers

490 search results - page 51 / 98
» Accuracy of Techniques for the Logical Analysis of Data
Sort
View
POPL
2012
ACM
13 years 8 months ago
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of confidentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential priva...
Gilles Barthe, Boris Köpf, Federico Olmedo, S...
106
Voted
SAC
2008
ACM
15 years 2 days ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
78
Voted
ASPDAC
2007
ACM
144views Hardware» more  ASPDAC 2007»
15 years 4 months ago
Design Methodology for 2.4GHz Dual-Core Microprocessor
This paper presents a design methodology that was applied to the design of a 2.4GHz dual-core SPARC64TM microprocessor with 90nm CMOS technology. It focuses on the newly adopted t...
Noriyuki Ito, Hiroaki Komatsu, Akira Kanuma, Akihi...
96
Voted
ICASSP
2008
IEEE
15 years 7 months ago
A constrained coefficient ica algorithm for group difference enhancement
Independent component analysis (ICA) is a statistical and computational technique for revealing hidden factors that underlie sets of signals. We propose an improved ICA framework ...
Jing Sui, Jingyu Liu, Lei Wu, Andrew Michael, Lai ...
92
Voted
VTC
2007
IEEE
140views Communications» more  VTC 2007»
15 years 6 months ago
Iterative Phase Noise Mitigation in MIMO-OFDM Systems with Pilot Aided Channel Estimation
— The use of multiple transmit and receive antennas in combination with multicarrier modulation, e.g. MIMO-OFDM, is a very promising technique for future wireless communication s...
Steffen Bittner, Ernesto Zimmermann, Gerhard Fettw...