Sciweavers

7504 search results - page 1282 / 1501
» Computing with Action Potentials
Sort
View
IMC
2010
ACM
15 years 1 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
190
Voted
ISAAC
2010
Springer
291views Algorithms» more  ISAAC 2010»
15 years 1 months ago
A Tighter Analysis of Work Stealing
Abstract. Classical list scheduling is a very popular and efficient technique for scheduling jobs in parallel platforms. However, with the increasing number of processors, the cost...
Marc Tchiboukdjian, Nicolas Gast, Denis Trystram, ...
143
Voted
MICRO
2010
IEEE
167views Hardware» more  MICRO 2010»
15 years 1 months ago
Erasing Core Boundaries for Robust and Configurable Performance
Single-thread performance, reliability and power efficiency are critical design challenges of future multicore systems. Although point solutions have been proposed to address thes...
Shantanu Gupta, Shuguang Feng, Amin Ansari, Scott ...
MICRO
2010
IEEE
119views Hardware» more  MICRO 2010»
15 years 1 months ago
A Predictive Model for Dynamic Microarchitectural Adaptivity Control
Abstract--Adaptive microarchitectures are a promising solution for designing high-performance, power-efficient microprocessors. They offer the ability to tailor computational resou...
Christophe Dubach, Timothy M. Jones, Edwin V. Boni...
WKDD
2010
CPS
238views Data Mining» more  WKDD 2010»
15 years 1 months ago
3D Scientific Data Mining in Ion Trajectories
In physics, structure of glass and ion trajectories are essentially based on statistical analysis of data acquired through experimental measurement and computer simulation [1, 2]. ...
J. M. Sharif, M. Mahadi Abdul Jamil, Md. Asri Ngad...
« Prev « First page 1282 / 1501 Last » Next »