Sciweavers

3865 search results - page 64 / 773
» Active memory operations
Sort
View
ICDM
2002
IEEE
159views Data Mining» more  ICDM 2002»
15 years 9 months ago
O-Cluster: Scalable Clustering of Large High Dimensional Data Sets
Clustering large data sets of high dimensionality has always been a serious challenge for clustering algorithms. Many recently developed clustering algorithms have attempted to ad...
Boriana L. Milenova, Marcos M. Campos
135
Voted
HOTOS
2007
IEEE
15 years 8 months ago
Automatic Mutual Exclusion
We propose a new concurrent programming model, Automatic Mutual Exclusion (AME). In contrast to lock-based programming, and to other programming models built over software transac...
Michael Isard, Andrew Birrell
ARVLSI
2001
IEEE
305views VLSI» more  ARVLSI 2001»
15 years 8 months ago
Logic Design Considerations for 0.5-Volt CMOS
As the operating supply voltage for commercial CMOS devices falls below 2 V, research activities are underway to develop CMOS integrated circuits that can operate at supply voltag...
K. Joseph Hass, Jack Venbrux, Prakash Bhatia
153
Voted
MOBICOM
2010
ACM
15 years 4 months ago
Stix: a goal-oriented distributed management system for large-scale broadband wireless access networks
Stix is a platform managing emerging large-scale broadband wireless access (BWA) networks. It has been developed to make it easy to manage such networks for community deployments ...
Giacomo Bernardi, Matt Calder, Damon Fenacci, Alex...
NN
2008
Springer
15 years 4 months ago
Two k-winners-take-all networks with discontinuous activation functions
This paper presents two k-winners-take-all (k-WTA) networks with discontinuous activation functions. The k-WTA operation is first converted equivalently into linear and quadratic ...
Qingshan Liu, Jun Wang