Sciweavers

1575 search results - page 211 / 315
» The provenance of electronic data
Sort
View
TODAES
1998
68views more  TODAES 1998»
14 years 11 months ago
Specification and verification of pipelining in the ARM2 RISC microprocessor
Abstract State Machines (ASMs) provide a sound mathematical basis for the specification and verification of systems. An application of the ASM methodology to the verification of a ...
James K. Huggins, David Van Campenhout
TVLSI
2002
100views more  TVLSI 2002»
14 years 11 months ago
Architectural strategies for low-power VLSI turbo decoders
Abstract--The use of "turbo codes" has been proposed for several applications, including the development of wireless systems, where highly reliable transmission is requir...
Guido Masera, M. Mazza, Gianluca Piccinini, F. Vig...
CORR
2010
Springer
162views Education» more  CORR 2010»
14 years 10 months ago
Networked Computing in Wireless Sensor Networks for Structural Health Monitoring
Abstract—This paper studies the problem of distributed computation over a network of wireless sensors. While this problem applies to many emerging applications, to keep our discu...
Apoorva Jindal, Mingyan Liu
IEEECIT
2010
IEEE
14 years 10 months ago
Term Weighting Approaches for Mining Significant Locations from Personal Location Logs
In this paper, we describe experiments into the application of term weighting techniques from text retrieval to support the automatic identification of significant locations from ...
Zhengwei Qiu, Cathal Gurrin, Aiden R. Doherty, Ala...
PVLDB
2010
179views more  PVLDB 2010»
14 years 10 months ago
Nearest Neighbor Search with Strong Location Privacy
The tremendous growth of the Internet has significantly reduced the cost of obtaining and sharing information about individuals, raising many concerns about user privacy. Spatial...
Stavros Papadopoulos, Spiridon Bakiras, Dimitris P...