Sciweavers

674 search results - page 96 / 135
» Explanation Based Program Transformation
Sort
View
74
Voted
EUSFLAT
2009
153views Fuzzy Logic» more  EUSFLAT 2009»
14 years 7 months ago
A Type-2 Fuzzy Portfolio Selection Problem Considering Possibility Measure and Crisp Possibilistic Mean Value
This paper considers a portfolio selection problem with type-2 fuzzy future returns involving ambiguous and subjectivity. Since this proposed problem is not well-defined due to fuz...
Takashi Hasuike, Hiroaki Ishii
LCTRTS
2010
Springer
15 years 2 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
85
Voted
BMCBI
2005
152views more  BMCBI 2005»
14 years 9 months ago
Improved profile HMM performance by assessment of critical algorithmic features in SAM and HMMER
Background: Profile hidden Markov model (HMM) techniques are among the most powerful methods for protein homology detection. Yet, the critical features for successful modelling ar...
Markus Wistrand, Erik L. L. Sonnhammer
VLSID
2002
IEEE
99views VLSI» more  VLSID 2002»
15 years 10 months ago
Input Space Adaptive Embedded Software Synthesis
This paper presents a novel technique, called input space adaptive software synthesis, for the energy and performance optimization of embedded software. The proposed technique is ...
Weidong Wang, Anand Raghunathan, Ganesh Lakshminar...
85
Voted
FCCM
2009
IEEE
172views VLSI» more  FCCM 2009»
15 years 4 months ago
Evaluation of Static Analysis Techniques for Fixed-Point Precision Optimization
Abstract—Precision analysis and optimization is very important when transforming a floating-point algorithm into fixedpoint hardware implementations. The core analysis techniqu...
Jason Cong, Karthik Gururaj, Bin Liu, Chunyue Liu,...