Sciweavers

745 search results - page 149 / 149
» Memory Exploration for Low Power, Embedded Systems
Sort
View
BSN
2009
IEEE
149views Sensor Networks» more  BSN 2009»
14 years 7 days ago
Optimizing Interval Training Protocols Using Data Mining Decision Trees
— Interval training consists of interl intensity exercises with rest periods. This training well known exercise protocol which helps stre improve one’s cardiovascular fitness. ...
Myung-kyung Suh, Mahsan Rofouei, Ani Nahapetian, W...
ENTCS
2006
146views more  ENTCS 2006»
13 years 5 months ago
Relating State-Based and Process-Based Concurrency through Linear Logic
This paper has the purpose of reviewing some of the established relationships between logic and concurrency, and of exploring new ones. Concurrent and distributed systems are noto...
Iliano Cervesato, Andre Scedrov
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
13 years 10 months ago
Revisiting the Firewall Abolition Act
Mobility and the New Global Economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The clas...
Philip Robinson, Jochen Haller
JFR
2007
150views more  JFR 2007»
13 years 5 months ago
Decisional autonomy of planetary rovers
To achieve the ever increasing demand for science return, planetary exploration rovers require more autonomy to successfully perform their missions. Indeed, the communication dela...
Félix Ingrand, Simon Lacroix, Solange Lemai...
PDP
2011
IEEE
12 years 9 months ago
Quantifying Thread Vulnerability for Multicore Architectures
Abstract—Continuously reducing transistor sizes and aggressive low power operating modes employed by modern architectures tend to increase transient error rates. Concurrently, mu...
Isil Oz, Haluk Rahmi Topcuoglu, Mahmut T. Kandemir...