Sciweavers

6978 search results - page 156 / 1396
» Reframing Requirements Analysis
Sort
View
108
Voted
CORR
2008
Springer
119views Education» more  CORR 2008»
14 years 9 months ago
Prototyping and Performance Analysis of a QoS MAC Layer for Industrial Wireless Network
: Today's industrial sensor networks require strong reliability and guarantees on messages delivery. These needs are even more important in real time applications like control...
Adrien van den Bossche, Thierry Val, Eric Campo
SIAMJO
2008
81views more  SIAMJO 2008»
14 years 8 months ago
A First-Order Convergence Analysis of Trust-Region Methods with Inexact Jacobians
A class of trust-region algorithms is developed and analyzed for the solution of minimization problems with nonlinear inequality constraints. Based on composite-step trust region ...
Andrea Walther
ITC
1998
IEEE
174views Hardware» more  ITC 1998»
15 years 2 months ago
High volume microprocessor test escapes, an analysis of defects our tests are missing
This paper explores defects found in a high volume microprocessor when shipping at a low defect level. A brief description of the manufacturing flow along with definition of DPM i...
Wayne M. Needham, Cheryl Prunty, Yeoh Eng Hong
90
Voted
BMCBI
2010
116views more  BMCBI 2010»
14 years 10 months ago
SEQADAPT: an adaptable system for the tracking, storage and analysis of high throughput sequencing experiments
Background: High throughput sequencing has become an increasingly important tool for biological research. However, the existing software systems for managing and processing these ...
David B. Burdick, Christopher C. Cavnor, Jeremy Ha...
FOCS
2010
IEEE
14 years 8 months ago
A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis
Abstract--We consider statistical data analysis in the interactive setting. In this setting a trusted curator maintains a database of sensitive information about individual partici...
Moritz Hardt, Guy N. Rothblum