Sciweavers

5675 search results - page 62 / 1135
» Exploiting Chaos for Computation
Sort
View
HPCA
2008
IEEE
15 years 10 months ago
PEEP: Exploiting predictability of memory dependences in SMT processors
Simultaneous Multithreading (SMT) attempts to keep a dynamically scheduled processor's resources busy with work from multiple independent threads. Threads with longlatency st...
Samantika Subramaniam, Milos Prvulovic, Gabriel H....
HPCA
2005
IEEE
15 years 10 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
ICWS
2009
IEEE
15 years 7 months ago
Exploiting Metrics for Similarity-Based Semantic Web Service Discovery
—Semantic Web Services (SWS) aim at the automated discovery and orchestration of Web services on the basis of comprehensive, machine-interpretable semantic descriptions. However,...
Stefan Dietze, Alessio Gugliotta, John Domingue
CVPR
2010
IEEE
15 years 6 months ago
Exploiting Hierarchical Context on a Large Database of Object Categories
There has been a growing interest in exploiting contextual information in addition to local features to detect and localize multiple object categories in an image. Context models ...
Myung Jin Choi, Joseph Lim, Antonio Torralba, Alan...
SEMCO
2009
IEEE
15 years 4 months ago
Enhanced Multimedia Content Access and Exploitation Using Semantic Speech Retrieval
—Techniques for automatic annotation of spoken content making use of speech recognition technology have long been characterized as holding unrealized promise to provide access to...
Roeland Ordelman, Franciska de Jong, Martha Larson