Sciweavers

2514 search results - page 90 / 503
» Design, Implementation, and Evaluation of a Digital Lectern ...
Sort
View
ISCAS
2007
IEEE
117views Hardware» more  ISCAS 2007»
15 years 7 months ago
On the Impact of I/Q Imbalance in Multi-Carrier Systems for Different Channel Scenarios
— I/Q imbalance has been identified as one of the most serious concerns in the practical implementation of the direct conversion receiver architecture. Facing the performance-de...
Marcus Windisch, Gerhard Fettweis
CHI
2010
ACM
15 years 6 months ago
The NICE discussion room: integrating paper and digital media to support co-located group meetings
Current technological solutions that enable content creation and sharing during group discussion meetings are often cumbersome to use, and are commonly abandoned for traditional p...
Michael Haller, Jakob Leitner, Thomas Seifried, Ja...
KBSE
2007
IEEE
15 years 7 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
SIGIR
2006
ACM
15 years 7 months ago
A statistical method for system evaluation using incomplete judgments
We consider the problem of large-scale retrieval evaluation, and we propose a statistical method for evaluating retrieval systems using incomplete judgments. Unlike existing techn...
Javed A. Aslam, Virgiliu Pavlu, Emine Yilmaz
GECCO
2007
Springer
179views Optimization» more  GECCO 2007»
15 years 7 months ago
A destructive evolutionary process: a pilot implementation
This paper describes the application of evolutionary search to the problem of Flash memory wear-out. The operating parameters of Flash memory are notoriously difficult to determin...
Joe Sullivan, Conor Ryan