Sciweavers

3361 search results - page 665 / 673
» An Approach of Performance Evaluation in Authentic Database ...
Sort
View
KBSE
2010
IEEE
14 years 7 months ago
Solving string constraints lazily
Decision procedures have long been a fixture in program analysis, and reasoning about string constraints is a key element in many program analyses and testing frameworks. Recent ...
Pieter Hooimeijer, Westley Weimer
ICCAD
2009
IEEE
135views Hardware» more  ICCAD 2009»
14 years 7 months ago
Enhanced reliability-aware power management through shared recovery technique
While Dynamic Voltage Scaling (DVS) remains as a popular energy management technique for real-time embedded applications, recent research has identified significant and negative i...
Baoxian Zhao, Hakan Aydin, Dakai Zhu
115
Voted
BMCBI
2011
14 years 4 months ago
Statistical Test of Expression Pattern (STEPath): a new strategy to integrate gene expression data with genomic information in i
Background: In the last decades, microarray technology has spread, leading to a dramatic increase of publicly available datasets. The first statistical tools developed were focuse...
Paolo G. V. Martini, Davide Risso, Gabriele Sales,...
TCOM
2010
101views more  TCOM 2010»
14 years 4 months ago
Spectral efficient transmit diversity techniques without cyclic prefix for fading relay channels
Abstract--This paper proposes spectral efficient relayassisted transmit diversity techniques, i.e., space-time and space-frequency block codes (STBC/SFBC), for single carrier frequ...
Ui-Kun Kwon, Dae-Young Seol, Gi-Hong Im
TON
2010
151views more  TON 2010»
14 years 4 months ago
Measurement-Driven Guidelines for 802.11 WLAN Design
Dense deployments of WLANs suffer from increased interference and as a result, reduced capacity. There are three main functions used to improve the overall network capacity: a) in...
Ioannis Broustis, Konstantina Papagiannaki, Srikan...