Sciweavers

381 search results - page 44 / 77
» Alpha-integration of multiple evidence
Sort
View
ICCD
2002
IEEE
146views Hardware» more  ICCD 2002»
15 years 8 months ago
From ASIC to ASIP: The Next Design Discontinuity
A variety of factors is making it increasingly difficult and expensive to design and manufacture traditional Application Specific Integrated Circuits (ASICs). This has started a s...
Kurt Keutzer, Sharad Malik, A. Richard Newton
CHI
2010
ACM
15 years 6 months ago
G-nome surfer: a tabletop interface for collaborative exploration of genomic data
Molecular and computational biologists develop new insights by gathering heterogeneous data from genomic databases and leveraging bioinformatics tools. Through a qualitative study...
Orit Shaer, Guy Kol, Megan Strait, Chloe Fan, Cath...
MOMPES
2009
IEEE
15 years 5 months ago
ArcheOpterix: An extendable tool for architecture optimization of AADL models
For embedded systems quality requirements are equally if not even more important than functional requirements. The foundation for the fulfillment of these quality requirements ha...
Aldeida Aleti, Stefan Björnander, Lars Grunsk...
WEBDB
2009
Springer
130views Database» more  WEBDB 2009»
15 years 5 months ago
A Referential Integrity Browser for Distributed Databases
We demonstrate a program that can inspect a distributed relational database on the Internet to discover and quantify referential integrity issues for integration purposes. The pro...
Carlos Ordonez, Javier García-García...
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 5 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi