Sciweavers

8655 search results - page 1267 / 1731
» Challenges for Trusted Computing
Sort
View
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
16 years 4 months ago
Real-time ranking with concept drift using expert advice
In many practical applications, one is interested in generating a ranked list of items using information mined from continuous streams of data. For example, in the context of comp...
Hila Becker, Marta Arias
KDD
2004
ACM
207views Data Mining» more  KDD 2004»
16 years 4 months ago
SPIN: mining maximal frequent subgraphs from graph databases
One fundamental challenge for mining recurring subgraphs from semi-structured data sets is the overwhelming abundance of such patterns. In large graph databases, the total number ...
Jun Huan, Wei Wang 0010, Jan Prins, Jiong Yang
VLSID
2007
IEEE
154views VLSI» more  VLSID 2007»
16 years 4 months ago
Application Specific Datapath Extension with Distributed I/O Functional Units
Performance of an application can be improved through augmenting the processor with Application specific Functional Units (AFUs). Usually a cluster of operations identified from th...
Nagaraju Pothineni, Anshul Kumar, Kolin Paul
VLSID
2005
IEEE
167views VLSI» more  VLSID 2005»
16 years 4 months ago
A Methodology and Tooling Enabling Application Specific Processor Design
This paper presents a highly efficient processor design methodology based on the LISA 2.0 language. Typically the architecture design phase is dominated by an iterative processor ...
Andreas Hoffmann, Frank Fiedler, Achim Nohl, Suren...
VLSID
2004
IEEE
139views VLSI» more  VLSID 2004»
16 years 4 months ago
Open Defects Detection within 6T SRAM Cells using a No Write Recovery Test Mode
The detection of all open defects within 6T SRAM cells is always a challenge due to the significant test time requirements. This paper proposes a new design-for-test (DFT) techniq...
André Ivanov, Baosheng Wang, Josh Yang
« Prev « First page 1267 / 1731 Last » Next »