Sciweavers

490 search results - page 51 / 98
» Accuracy of Techniques for the Logical Analysis of Data
Sort
View
POPL
2012
ACM
12 years 6 months ago
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of confidentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential priva...
Gilles Barthe, Boris Köpf, Federico Olmedo, S...
SAC
2008
ACM
13 years 10 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
ASPDAC
2007
ACM
144views Hardware» more  ASPDAC 2007»
14 years 3 months ago
Design Methodology for 2.4GHz Dual-Core Microprocessor
This paper presents a design methodology that was applied to the design of a 2.4GHz dual-core SPARC64TM microprocessor with 90nm CMOS technology. It focuses on the newly adopted t...
Noriyuki Ito, Hiroaki Komatsu, Akira Kanuma, Akihi...
ICASSP
2008
IEEE
14 years 5 months ago
A constrained coefficient ica algorithm for group difference enhancement
Independent component analysis (ICA) is a statistical and computational technique for revealing hidden factors that underlie sets of signals. We propose an improved ICA framework ...
Jing Sui, Jingyu Liu, Lei Wu, Andrew Michael, Lai ...
VTC
2007
IEEE
140views Communications» more  VTC 2007»
14 years 5 months ago
Iterative Phase Noise Mitigation in MIMO-OFDM Systems with Pilot Aided Channel Estimation
— The use of multiple transmit and receive antennas in combination with multicarrier modulation, e.g. MIMO-OFDM, is a very promising technique for future wireless communication s...
Steffen Bittner, Ernesto Zimmermann, Gerhard Fettw...