Sciweavers

7504 search results - page 1174 / 1501
» Computing with Action Potentials
Sort
View
ICCAD
2005
IEEE
90views Hardware» more  ICCAD 2005»
16 years 1 months ago
Scalable compositional minimization via static analysis
State-equivalence based reduction techniques, e.g. bisimulation minimization, can be used to reduce a state transition system to facilitate subsequent verification tasks. However...
Fadi A. Zaraket, Jason Baumgartner, Adnan Aziz
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
16 years 1 months ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
IUI
2009
ACM
16 years 1 months ago
Parakeet: a continuous speech recognition system for mobile touch-screen devices
We present Parakeet, a system for continuous speech recognition on mobile touch-screen devices. The design of Parakeet was guided by computational experiments and validated by a u...
Keith Vertanen, Per Ola Kristensson
ISPASS
2010
IEEE
15 years 11 months ago
Hardware prediction of OS run-length for fine-grained resource customization
—In the past ten years, computer architecture has seen a paradigm shift from emphasizing single thread performance to energy efficient, throughput oriented, chip multiprocessors...
David Nellans, Kshitij Sudan, Rajeev Balasubramoni...
ASM
2010
ASM
15 years 11 months ago
Secrecy UML Method for Model Transformations
Abstract. This paper introduces the subject of secrecy models development by transformation, with formal validation. In an enterprise, constructing a secrecy model is a participato...
Waël Hassan, Nadera Slimani, Kamel Adi, Luigi...
« Prev « First page 1174 / 1501 Last » Next »