Sciweavers

1141 search results - page 88 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
ICS
2005
Tsinghua U.
15 years 6 months ago
Low-power, low-complexity instruction issue using compiler assistance
In an out-of-order issue processor, instructions are dynamically reordered and issued to function units in their dataready order rather than their original program order to achiev...
Madhavi Gopal Valluri, Lizy Kurian John, Kathryn S...
HPCA
2004
IEEE
16 years 1 months ago
Wavelet Analysis for Microprocessor Design: Experiences with Wavelet-Based dI/dt Characterization
As microprocessors become increasingly complex, the techniques used to analyze and predict their behavior must become increasingly rigorous. This paper applies wavelet analysis te...
Russ Joseph, Zhigang Hu, Margaret Martonosi
104
Voted
ICMT
2009
Springer
15 years 7 months ago
Model Superimposition in Software Product Lines
In software product line engineering, feature composition generates software tailored to specific requirements from a common set of artifacts. Superimposition is a technique to me...
Sven Apel, Florian Janda, Salvador Trujillo, Chris...
99
Voted
CEC
2007
IEEE
15 years 4 months ago
A closed loop stability analysis and parameter selection of the Particle Swarm Optimization dynamics for faster convergence
This paper presents an alternative formulation of the PSO dynamics by a closed loop control system, and analyzes the stability behavior of the system by using Jury's test and ...
Nayan R. Samal, Amit Konar, Swagatam Das, Ajith Ab...
102
Voted
RAID
2000
Springer
15 years 4 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner