Sciweavers

2838 search results - page 332 / 568
» Verifying Controlled Components
Sort
View
95
Voted
CSE
2009
IEEE
15 years 7 months ago
Noise Injection for Search Privacy Protection
Abstract—Extensive work has been devoted to private information retrieval and privacy preserving data mining. To protect user privacy from search engines, however, most current a...
Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Ch...
81
Voted
DATE
2009
IEEE
129views Hardware» more  DATE 2009»
15 years 7 months ago
Improved performance and variation modelling for hierarchical-based optimisation of analogue integrated circuits
A new approach in hierarchical optimisation is presented which is capable of optimising both the performance and yield of an analogue design. Performance and yield trade offs are ...
Sawal Ali, Li Ke, Reuben Wilcock, Peter Wilson
79
Voted
ICASSP
2009
IEEE
15 years 7 months ago
A game-theoretic framework for multi-user multimedia rate allocation
How to efficiently and fairly allocate data rate among different users is a key problem in the field of multiuser multimedia communication. However, most of the existing optimiz...
Yan Chen, Beibei Wang, K. J. Ray Liu
123
Voted
SEUS
2009
IEEE
15 years 7 months ago
Exploring the Design Space for Network Protocol Stacks on Special-Purpose Embedded Systems
Many special-purpose embedded systems such as automobiles and aircrafts consist of multiple embedded controllers connected through embedded network interconnects. Such network inte...
Hyun-Wook Jin, Junbeom Yoo
105
Voted
KBSE
2009
IEEE
15 years 7 months ago
SMT-Based Bounded Model Checking for Embedded ANSI-C Software
Propositional bounded model checking has been applied successfully to verify embedded software but is limited by the increasing propositional formula size and the loss of structur...
Lucas Cordeiro, Bernd Fischer, João Marques...