Sciweavers

2357 search results - page 45 / 472
» Computing Refactorings of Behavior Models
Sort
View
AINA
2007
IEEE
14 years 10 months ago
Detecting Anomaly Node Behavior in Wireless Sensor Networks
Wireless sensor networks are usually deployed in a way “once deployed, never changed”. The actions of sensor nodes are either pre-scheduled inside chips or triggered to respon...
Qinghua Wang, Tingting Zhang
ISPD
1999
ACM
108views Hardware» more  ISPD 1999»
15 years 2 months ago
On the behavior of congestion minimization during placement
Typical placement objectives involve reducing net-cut cost or minimizing wirelength. Congestion minimization is least understood, however, it models routability accurately. In thi...
Maogang Wang, Majid Sarrafzadeh
CIG
2006
IEEE
15 years 4 months ago
Capturing The Information Conveyed By Opponents' Betting Behavior in Poker
— This paper develops an approach to the capture and measurement of the information contained in opponents’ bet actions in seven card stud poker. We develop a causal model link...
Eric Saund
ICCAD
2003
IEEE
140views Hardware» more  ICCAD 2003»
15 years 6 months ago
Fast Cycle-accurate Behavioral Simulation for Pipelined Processors Using Early Pipeline Evaluation
Modeling and simulating pipelined processors in procedural languages such as C/C++ requires lots of cost in handling concurrent events, which hinders fast simulation. A number of ...
In-Cheol Park, Se-Hyeon Kang, Yongseok Yi
IPPS
2007
IEEE
15 years 4 months ago
Detecting Runtime Environment Interference with Parallel Application Behavior
Many performance problems observed in high end systems are actually caused by the runtime system and not the application code. Detecting these cases will require parallel performa...
Rashawn L. Knapp, Karen L. Karavanic, Douglas M. P...