Sciweavers

1009 search results - page 147 / 202
» Performance Analysis of UML Models Using Aspect-Oriented Mod...
Sort
View
IDEAS
2005
IEEE
165views Database» more  IDEAS 2005»
15 years 3 months ago
Privacy Aware Data Generation for Testing Database Applications
Testing of database applications is of great importance. A significant issue in database application testing consists in the availability of representative data. In this paper we...
Xintao Wu, Chintan Sanghvi, Yongge Wang, Yuliang Z...
NIPS
1997
14 years 11 months ago
EM Algorithms for PCA and SPCA
I present an expectation-maximization (EM) algorithm for principal component analysis (PCA). The algorithm allows a few eigenvectors and eigenvalues to be extracted from large col...
Sam T. Roweis
CC
2010
Springer
190views System Software» more  CC 2010»
15 years 4 months ago
Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors?
On Chip Multiprocessors (CMP), it is common that multiple cores share certain levels of cache. The sharing increases the contention in cache and memory-to-chip bandwidth, further h...
Yunlian Jiang, Eddy Z. Zhang, Kai Tian, Xipeng She...
ICCAD
2000
IEEE
73views Hardware» more  ICCAD 2000»
15 years 2 months ago
Simulation and Optimization of the Power Distribution Network in VLSI Circuits
In this paper, we present simulation techniques to estimate the worst-case voltage variation using a RC model for the power distribution network. Pattern independent maximum envel...
Geng Bai, Sudhakar Bobba, Ibrahim N. Hajj
ECOOP
2005
Springer
15 years 3 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...