Sciweavers

1419 search results - page 149 / 284
» Analysis of Summarization Evaluation Experiments
Sort
View
DATE
2006
IEEE
84views Hardware» more  DATE 2006»
15 years 4 months ago
Vulnerability analysis of L2 cache elements to single event upsets
Memory elements are the most vulnerable system component to soft errors. Since memory elements in cache arrays consume a large fraction of the die in modern microprocessors, the p...
Hossein Asadi, Vilas Sridharan, Mehdi Baradaran Ta...
GLVLSI
2006
IEEE
119views VLSI» more  GLVLSI 2006»
15 years 4 months ago
Thermal analysis of a 3D die-stacked high-performance microprocessor
3-dimensional integrated circuit (3D IC) technology places circuit blocks in the vertical dimension in addition to the conventional horizontal plane. Compared to conventional plan...
Kiran Puttaswamy, Gabriel H. Loh
UIST
1997
ACM
15 years 2 months ago
Usability Analysis of 3D Rotation Techniques
We report results from a formal user study of interactive 3D rotation using the mouse-driven Virtual Sphere and Arcball techniques, as well as multidimensional input techniques ba...
Ken Hinckley, Joe Tullio, Randy F. Pausch, Dennis ...
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
15 years 2 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
TCBB
2010
106views more  TCBB 2010»
14 years 8 months ago
Predicting Novel Human Gene Ontology Annotations Using Semantic Analysis
—The correct interpretation of many molecular biology experiments depends in an essential way on the accuracy and consistency of the existing annotation databases. Such databases...
Bogdan Done, Purvesh Khatri, Arina Done, Sorin Dra...