Sciweavers

217 search results - page 14 / 44
» Backdoors To Typical Case Complexity
Sort
View
CGO
2007
IEEE
15 years 5 months ago
Loop Optimization using Hierarchical Compilation and Kernel Decomposition
The increasing complexity of hardware features for recent processors makes high performance code generation very challenging. In particular, several optimization targets have to b...
Denis Barthou, Sébastien Donadio, Patrick C...
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
15 years 5 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
JSAC
2006
89views more  JSAC 2006»
14 years 11 months ago
Robust multiuser detection for multicarrier CDMA systems
Abstract--Multiuser detection (MUD) for code-division multiple-access (CDMA) systems usually relies on some a priori channel estimates, which are obtained either blindly or by usin...
Rensheng Wang, Hongbin Li, Tao Li
ISAMI
2010
14 years 9 months ago
A Data Mining Approach for the Detection of High-Risk Breast Cancer Groups
It is widely agreed that complex diseases are typically caused by the joint effects of multiple instead of a single genetic variation. These genetic variations may show very little...
Orlando Anunciação, Bruno C. Gomes, ...
83
Voted
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 5 months ago
Applying The Balanced Capacity Concept to DSL Systems
— This paper investigates a fair resource allocation method in crosstalk limited DSL (Digital Subscriber Line) systems. As a measure of fairness, the concept of Balanced Capacity...
Ali Kalakech, Jérôme Louveaux, Luc Va...