Sciweavers

36 search results - page 6 / 8
» Exploiting Upper Approximation in the Rough Set Methodology
Sort
View
VTS
2008
IEEE
78views Hardware» more  VTS 2008»
15 years 4 months ago
Expanding Trace Buffer Observation Window for In-System Silicon Debug through Selective Capture
Trace buffers are commonly used to capture data during in-system silicon debug. This paper exploits the fact that it is not necessary to capture error-free data in the trace buffe...
Joon-Sung Yang, Nur A. Touba
CASES
2003
ACM
15 years 1 months ago
A hierarchical approach for energy efficient application design using heterogeneous embedded systems
Several features such as reconfiguration, voltage and frequency scaling, low-power operating states, duty-cycling, etc. are exploited for latency and energy efficient application ...
Sumit Mohanty, Viktor K. Prasanna
BMCBI
2007
140views more  BMCBI 2007»
14 years 10 months ago
Accurate prediction of protein secondary structure and solvent accessibility by consensus combiners of sequence and structure in
Background: Structural properties of proteins such as secondary structure and solvent accessibility contribute to three-dimensional structure prediction, not only in the ab initio...
Gianluca Pollastri, Alberto J. M. Martin, Catherin...
TKDE
2011
332views more  TKDE 2011»
14 years 5 months ago
Adaptive Cluster Distance Bounding for High-Dimensional Indexing
—We consider approaches for similarity search in correlated, high-dimensional data-sets, which are derived within a clustering framework. We note that indexing by “vector appro...
Sharadh Ramaswamy, Kenneth Rose
SEKE
2004
Springer
15 years 3 months ago
Supporting the Requirements Prioritization Process. A Machine Learning approach
Requirements prioritization plays a key role in the requirements engineering process, in particular with respect to critical tasks such as requirements negotiation and software re...
Paolo Avesani, Cinzia Bazzanella, Anna Perini, Ang...