Sciweavers

1809 search results - page 308 / 362
» Software Model Checking Using Linear Constraints
Sort
View
TIP
2010
107views more  TIP 2010»
13 years 3 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
TCAD
2010
107views more  TCAD 2010»
13 years 3 months ago
Evaluating Statistical Power Optimization
In response to the increasing variations in integrated-circuit manufacturing, the current trend is to create designs that take these variations into account statistically. In this ...
Jason Cong, Puneet Gupta, John Lee
CC
2007
Springer
107views System Software» more  CC 2007»
14 years 3 months ago
A Fast Cutting-Plane Algorithm for Optimal Coalescing
Abstract. Recent work has shown that the subtasks of register allocation (spilling, register assignment, and coalescing) can be completely separated. This work presents an algorith...
Daniel Grund, Sebastian Hack
HICSS
1995
IEEE
109views Biometrics» more  HICSS 1995»
14 years 17 days ago
The architecture of an optimistic CPU: the WarpEngine
The architecture for a shared memory CPU is described. The CPU allows for parallelism down to the level of single instructions and is tolerant of memory latency. All executable in...
John G. Cleary, Murray Pearson, Husam Kinawi
BIOINFORMATICS
2005
72views more  BIOINFORMATICS 2005»
13 years 9 months ago
Use of within-array replicate spots for assessing differential expression in microarray experiments
Motivation. Spotted arrays are often printed with probes in duplicate or triplicate, but current methods for assessing differential expression are not able to make full use of the...
Gordon K. Smyth, Joëlle Michaud, Hamish S. Sc...