Sciweavers

13841 search results - page 2699 / 2769
» Algorithms and Constraint Programming
Sort
View
131
Voted
PODS
2010
ACM
306views Database» more  PODS 2010»
15 years 5 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...
OOPSLA
2001
Springer
15 years 5 months ago
Regression Test Selection for Java Software
Regression testing is applied to modified software to provide confidence that the changed parts behave as intended and that the unchanged parts have not been adversely affected ...
Mary Jean Harrold, James A. Jones, Tongyu Li, Dong...
FCCM
1999
IEEE
134views VLSI» more  FCCM 1999»
15 years 4 months ago
Runlength Compression Techniques for FPGA Configurations
The time it takes to reconfigure FPGAs can be a significant overhead for reconfigurable computing. In this paper we develop new compression algorithms for FPGA configurations that...
Scott Hauck, William D. Wilson
120
Voted
ICS
1999
Tsinghua U.
15 years 4 months ago
Software trace cache
—This paper explores the use of compiler optimizations which optimize the layout of instructions in memory. The target is to enable the code to make better use of the underlying ...
Alex Ramírez, Josep-Lluis Larriba-Pey, Carl...
ICCAD
1997
IEEE
118views Hardware» more  ICCAD 1997»
15 years 4 months ago
Global interconnect sizing and spacing with consideration of coupling capacitance
This paper presents an efficient approach to perform global interconnect sizing and spacing (GISS) for multiple nets to minimize interconnect delays with consideration of couplin...
Jason Cong, Lei He, Cheng-Kok Koh, David Zhigang P...
« Prev « First page 2699 / 2769 Last » Next »