Sciweavers

2018 search results - page 379 / 404
» Code Normal Forms
Sort
View
ISCAS
2008
IEEE
217views Hardware» more  ISCAS 2008»
14 years 3 months ago
Approximate L0 constrained non-negative matrix and tensor factorization
— Non-negative matrix factorization (NMF), i.e. V ≈ WH where both V, W and H are non-negative has become a widely used blind source separation technique due to its part based r...
Morten Mørup, Kristoffer Hougaard Madsen, L...
PIMRC
2008
IEEE
14 years 3 months ago
Multiplexing precoding scheme for STC-CPM with parametric phase discriminator IWM receiver
—A constant envelope Continuous Phase Modulation (CPM) class of Multi-Channel (MC) modulations for multiantenna transmitters is considered. Each receive antenna receives a superp...
Jan Sykora, Robert Schober
IEEEPACT
2006
IEEE
14 years 2 months ago
An empirical evaluation of chains of recurrences for array dependence testing
Code restructuring compilers rely heavily on program analysis techniques to automatically detect data dependences between program statements. Dependences between statement instanc...
Johnnie Birch, Robert A. van Engelen, Kyle A. Gall...
ASPLOS
2006
ACM
14 years 2 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
KBSE
2005
IEEE
14 years 2 months ago
An analysis of rule coverage as a criterion in generating minimal test suites for grammar-based software
The term grammar-based software describes software whose input can be specified by a context-free grammar. This grammar may occur explicitly in the software, in the form of an in...
Mark Hennessy, James F. Power