Sciweavers

267 search results - page 49 / 54
» Inspections - Some Surprising Findings
Sort
View
PODS
2007
ACM
122views Database» more  PODS 2007»
14 years 7 months ago
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
The contingency table is a work horse of official statistics, the format of reported data for the US Census, Bureau of Labor Statistics, and the Internal Revenue Service. In many ...
Boaz Barak, Kamalika Chaudhuri, Cynthia Dwork, Sat...
ICDT
2010
ACM
161views Database» more  ICDT 2010»
14 years 4 months ago
Composition with Target Constraints
It is known that the composition of schema mappings, each specified by source-to-target tgds (st-tgds), can be specified by a secondorder tgd (SO tgd). We consider the question of...
Marcelo Arenas, Ronald Fagin, Alan Nash
LCN
2006
IEEE
14 years 1 months ago
Performance Limits and Analysis of Contention-based IEEE 802.11 MAC
— Recent advance in IEEE 802.11 based standard has pushed the wireless bandwidth up to 600Mbps while keeping the same wireless medium access control (MAC) schemes for full backwa...
Shao-Cheng Wang, Ahmed Helmy
ISLPED
2006
ACM
117views Hardware» more  ISLPED 2006»
14 years 1 months ago
Energy/power breakdown of pipelined nanometer caches (90nm/65nm/45nm/32nm)
As transistors continue to scale down into the nanometer regime, device leakage currents are becoming the dominant cause of power dissipation in nanometer caches, making it essent...
Samuel Rodríguez, Bruce L. Jacob
CLEF
2005
Springer
14 years 1 months ago
The Use of MedGIFT and EasyIR for ImageCLEF 2005
This article describes the use of the medGIFT and easyIR retrieval systems for three of the four ImageCLEF 2005 retrieval tasks. We participated in the ad–hoc retrieval task that...
Henning Müller, Antoine Geissbühler, Joh...