Sciweavers

1128 search results - page 177 / 226
» Structuring anonymity metrics
Sort
View
DATE
2007
IEEE
155views Hardware» more  DATE 2007»
14 years 3 months ago
Design fault directed test generation for microprocessor validation
Functional validation of modern microprocessors is an important and complex problem. One of the problems in functional validation is the generation of test cases that has higher p...
Deepak Mathaikutty, Sandeep K. Shukla, Sreekumar V...
GLOBECOM
2007
IEEE
14 years 3 months ago
An Enhanced RFID Multiple Access Protocol for Fast Inventory
- The relevant performance metric for successful deployment of Radio Frequency Identification (RFID) systems for tag inventory applications is the latency for reading all tags with...
You-Chang Ko, Sumit Roy, Joshua R. Smith, Hyung-Wo...
ICDCS
2007
IEEE
14 years 3 months ago
Protocol Design for Dynamic Delaunay Triangulation
Delaunay triangulation (DT) is a useful geometric structure for networking applications. In this paper we investigate the design of join, leave, and maintenance protocols to const...
Dong-Young Lee, Simon S. Lam
ICDE
2007
IEEE
152views Database» more  ICDE 2007»
14 years 3 months ago
Automatically Identifying Known Software Problems
Re-occurrence of the same problem is very common in many large software products. By matching the symptoms of a new problem to those in a database of known problems, automated dia...
Natwar Modani, Rajeev Gupta, Guy M. Lohman, Tanvee...
ICDM
2007
IEEE
116views Data Mining» more  ICDM 2007»
14 years 3 months ago
A Computational Approach to Style in American Poetry
We develop a quantitative method to assess the style of American poems and to visualize a collection of poems in relation to one another. Qualitative poetry criticism helped guide...
David M. Kaplan, David M. Blei