Sciweavers

2028 search results - page 348 / 406
» Deriving Relation Keys from XML Keys
Sort
View
DATE
2008
IEEE
104views Hardware» more  DATE 2008»
15 years 10 months ago
Multi-Vector Tests: A Path to Perfect Error-Rate Testing
The importance of testing approaches that exploit error tolerance to improve yield has previously been established. Error rate, defined as the percentage of vectors for which the...
Shideh Shahidi, Sandeep Gupta
ICASSP
2008
IEEE
15 years 10 months ago
Efficient channel quantization scheme for multi-user MIMO broadcast channels with RBD precoding
Abstract — Regularized block diagonalization (RBD) is a new linear precoding technique for the multi-antenna broadcast channel and has a significantly improved sum rate and dive...
Bin Song, Florian Roemer, Martin Haardt
COCO
2007
Springer
85views Algorithms» more  COCO 2007»
15 years 10 months ago
Norms, XOR Lemmas, and Lower Bounds for GF(2) Polynomials and Multiparty Protocols
This paper presents a unified and simple treatment of basic questions concerning two computational models: multiparty communication complexity and GF(2) polynomials. The key is t...
Emanuele Viola, Avi Wigderson
EMSOFT
2007
Springer
15 years 10 months ago
Uniformity improving page allocation for flash memory file systems
Flash memory is a storage medium that is becoming more and more popular. Though not yet fully embraced in traditional computing systems, Flash memory is prevalent in embedded syst...
Seungjae Baek, Seongjun Ahn, Jongmoo Choi, Donghee...
ACMSE
2006
ACM
15 years 10 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.