Sciweavers

4270 search results - page 815 / 854
» A Permutation Approach to Validation
Sort
View
153
Voted
WCNC
2010
IEEE
15 years 7 months ago
Differentiable Spectrum Partition for Fractional Frequency Reuse in Multi-Cell OFDMA Networks
To mitigate inter-cell interference (ICI) and achieve higher spectrum efficiency, fractional frequency reuse (FFR) has been widely adopted by the next generation wireless systems...
Weihuang Fu, Zhifeng Tao, Jinyun Zhang, Dharma P. ...
147
Voted
ASPLOS
2006
ACM
15 years 7 months ago
Accurate and efficient regression modeling for microarchitectural performance and power prediction
We propose regression modeling as an efficient approach for accurately predicting performance and power for various applications executing on any microprocessor configuration in a...
Benjamin C. Lee, David M. Brooks
139
Voted
COOPIS
2004
IEEE
15 years 7 months ago
Composing Mappings Between Schemas Using a Reference Ontology
Large-scale database integration requires a significant cost in developing a global schema and finding mappings between the global and local schemas. Developing the global schema r...
Eduard C. Dragut, Ramon Lawrence
158
Voted
BALT
2006
15 years 7 months ago
Introducing Softness into Inductive Queries on String Databases
In many application domains (e.g., WWW mining, molecular biology), large string datasets are available and yet under-exploited. The inductive database framework assumes that both s...
Ieva Mitasiunaite, Jean-François Boulicaut
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
15 years 7 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...