Sciweavers

861 search results - page 120 / 173
» Predicting Attack-prone Components
Sort
View
ISQED
2009
IEEE
126views Hardware» more  ISQED 2009»
14 years 5 months ago
Robust differential asynchronous nanoelectronic circuits
Abstract — Nanoelectronic design faces unprecedented reliability challenges and must achieve noise immunity and delay insensitiveness in the presence of prevalent defects and sig...
Bao Liu
CSE
2009
IEEE
14 years 5 months ago
Surfing a Web of Trust: Reputation and Reciprocity on CouchSurfing.com
—Reputation mechanisms are essential for online transactions, where the parties have little prior experience with one another. This is especially true when transactions result in...
Debra Lauterbach, Hung Truong, Tanuj Shah, Lada A....
GLOBECOM
2009
IEEE
14 years 5 months ago
EXIT Chart Evaluation of a Receiver Structure for Multi-User Multi-Antenna OFDM Systems
— In this paper we evaluate, by means of Extrinsic Information Transfer (EXIT) charts, an iterative receiver that has emerged as a promising candidate for non-coherent multi-user...
Peter Hammarberg, Fredrik Rusek, Pierluigi Salvo R...
ICEBE
2009
IEEE
147views Business» more  ICEBE 2009»
14 years 5 months ago
The Design and Implementation of Service Reservations in Real-Time SOA
—Service-oriented architecture (SOA) provides the flexibility of dynamically composing business processes in enterprise computing. However, they must be enhanced to support real...
Mark Panahi, Weiran Nie, Kwei-Jay Lin
GECCO
2009
Springer
101views Optimization» more  GECCO 2009»
14 years 4 months ago
Modeling UCS as a mixture of experts
We present a probabilistic formulation of UCS (a sUpervised Classifier System). UCS is shown to be a special case of mixture of experts where the experts are learned independentl...
Narayanan Unny Edakunni, Tim Kovacs, Gavin Brown, ...