Sciweavers

7167 search results - page 1298 / 1434
» A Technique for Invariant Generation
Sort
View
ML
2010
ACM
151views Machine Learning» more  ML 2010»
14 years 8 months ago
Inductive transfer for learning Bayesian networks
In several domains it is common to have data from different, but closely related problems. For instance, in manufacturing, many products follow the same industrial process but with...
Roger Luis, Luis Enrique Sucar, Eduardo F. Morales
CGF
2010
177views more  CGF 2010»
14 years 8 months ago
Condenser-Based Instant Reflectometry
We present a technique for rapid capture of high quality bidirectional reflection distribution functions(BRDFs) of surface points. Our method represents the BRDF at each point by ...
Yanxiang Lan, Yue Dong, Jiaping Wang, Xin Tong, Ba...
ACSAC
2010
IEEE
14 years 8 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
IPPS
2010
IEEE
14 years 8 months ago
Speculative execution on multi-GPU systems
Abstract--The lag of parallel programming models and languages behind the advance of heterogeneous many-core processors has left a gap between the computational capability of moder...
Gregory F. Diamos, Sudhakar Yalamanchili
ICCAD
2009
IEEE
117views Hardware» more  ICCAD 2009»
14 years 7 months ago
Binning optimization based on SSTA for transparently-latched circuits
With increasing process variation, binning has become an important technique to improve the values of fabricated chips, especially in high performance microprocessors where transpa...
Min Gong, Hai Zhou, Jun Tao, Xuan Zeng
« Prev « First page 1298 / 1434 Last » Next »