Sciweavers

1522 search results - page 174 / 305
» Practical Exception Specifications
Sort
View
DFT
2004
IEEE
78views VLSI» more  DFT 2004»
15 years 5 months ago
Reliability Modeling and Assurance of Clockless Wave Pipeline
This paper presents theoretical yet practical methodologies to model, assure and optimize the Reliability of Clockless Wave Pipeline. Clockless wave pipeline is a cutting-edge and...
T. Feng, Nohpill Park, Yong-Bin Kim, Fabrizio Lomb...
127
Voted
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
15 years 3 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
BMCBI
2010
175views more  BMCBI 2010»
15 years 2 months ago
Global parameter estimation methods for stochastic biochemical systems
Background: The importance of stochasticity in cellular processes having low number of molecules has resulted in the development of stochastic models such as chemical master equat...
Suresh Kumar Poovathingal, Rudiyanto Gunawan
ESE
2006
154views Database» more  ESE 2006»
15 years 1 months ago
Prioritizing JUnit Test Cases: An Empirical Assessment and Cost-Benefits Analysis
Test case prioritization provides a way to run test cases with the highest priority earliest. Numerous empirical studies have shown that prioritization can improve a test suite�...
Hyunsook Do, Gregg Rothermel, Alex Kinneer
JSAC
2008
98views more  JSAC 2008»
15 years 1 months ago
Multiuser Detection of Sparsely Spread CDMA
Code-division multiple access (CDMA) is the basis of a family of advanced air interfaces in current and future generation networks. The benefits promised by CDMA have not been full...
Dongning Guo, Chih-Chun Wang