Sciweavers

3801 search results - page 684 / 761
» An Approach to Modeling Software Safety
Sort
View
DAC
2008
ACM
15 years 10 months ago
Path smoothing via discrete optimization
A fundamental problem in timing-driven physical synthesis is the reduction of critical paths in a design. In this work, we propose a powerful new technique that moves (and can als...
Michael D. Moffitt, David A. Papa, Zhuo Li, Charle...
DAC
2002
ACM
15 years 10 months ago
Energy estimation and optimization of embedded VLIW processors based on instruction clustering
Aim of this paper is to propose a methodology for the definition of an instruction-level energy estimation framework for VLIW (Very Long Instruction Word) processors. The power mo...
Andrea Bona, Mariagiovanna Sami, Donatella Sciuto,...
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
15 years 10 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
ICALT
2008
IEEE
15 years 4 months ago
Learning Application Suite Creating and Playing SCORM Compatible Web and Computer Based Training
In the process of developing Web Based Training (WBT) applications, the Sharable Content Object Reference Model (SCORM) has become the most common eLearning standard making it pos...
Marco Nordmann, Jens Neumann
IPPS
2008
IEEE
15 years 4 months ago
Design and optimization of a distributed, embedded speech recognition system
In this paper, we present the design and implementation of a distributed sensor network application for embedded, isolated-word, real-time speech recognition. In our system design...
Chung-Ching Shen, William Plishker, Shuvra S. Bhat...