Sciweavers

5856 search results - page 876 / 1172
» Developing Query Patterns
Sort
View
NOCS
2008
IEEE
15 years 9 months ago
Network Simplicity for Latency Insensitive Cores
In this paper we examine a latency insensitive network composed of very fast and simple circuits that connects SoC cores that are also latency insensitive, de-synchronized, or asy...
Daniel Gebhardt, JunBok You, W. Scott Lee, Kenneth...
CIVR
2007
Springer
164views Image Analysis» more  CIVR 2007»
15 years 9 months ago
Inducing a perceptual relevance shape classifier
In this paper, we develop a system to classify the outputs of image segmentation algorithms as perceptually relevant or perceptually irrelevant with respect to human perception. T...
Victoria J. Hodge, John P. Eakins, James Austin
GECCO
2007
Springer
308views Optimization» more  GECCO 2007»
15 years 9 months ago
Multiobjective clustering with automatic k-determination for large-scale data
Web mining - data mining for web data - is a key factor of web technologies. Especially, web behavior mining has attracted a great deal of attention recently. Behavior mining invo...
Nobukazu Matake, Tomoyuki Hiroyasu, Mitsunori Miki...
TGC
2007
Springer
15 years 9 months ago
A Protocol Compiler for Secure Sessions in ML
Distributed applications can be structured using sessions that specify flows of messages between roles. We design a small specific language to declare sessions. We then build a c...
Ricardo Corin, Pierre-Malo Deniélou
LICS
2006
IEEE
15 years 9 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon