Sciweavers

813 search results - page 56 / 163
» Pipeline-centric provenance model
Sort
View
ICASSP
2010
IEEE
13 years 10 months ago
Stability analysis of an adaptive Wiener structure
In the context of digital pre-distortion, a typical requirement is to identify the power amplifier with stringently low computational complexity. Accordingly, we consider a simpl...
Robert Dallinger, Markus Rupp
CORR
2007
Springer
95views Education» more  CORR 2007»
13 years 10 months ago
Parametric Yield Analysis of Mems via Statistical Methods
This paper considers a developing theory on the effects of inevitable process variations during the fabrication of MEMS and other microsystems. The effects on the performance and ...
Shyam Praveen Vudathu, Kishore K. Duganapalli, Rai...
WWW
2005
ACM
14 years 10 months ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...
CISIS
2009
IEEE
14 years 4 months ago
Application of a Critical Chain Project Management Based Framework on Max-Plus Linear Systems
Abstract. We focus on discrete event systems with a structure of parallel processing, synchronization, and noconcurrency. We use max-plus algebra, which is an effective approach fo...
Hirotaka Takahashi, Hiroyuki Goto, Munenori Kasaha...
APPROX
2009
Springer
107views Algorithms» more  APPROX 2009»
14 years 4 months ago
Hierarchy Theorems for Property Testing
Referring to the query complexity of property testing, we prove the existence of a rich hierarchy of corresponding complexity classes. That is, for any relevant function q, we prov...
Oded Goldreich, Michael Krivelevich, Ilan Newman, ...