Sciweavers

13895 search results - page 2461 / 2779
» Exploring
Sort
View
136
Voted
CODES
2005
IEEE
15 years 10 months ago
Memory access optimizations in instruction-set simulators
Design of programmable processors and embedded applications requires instruction-set simulators for early exploration and validation of candidate architectures. Interpretive simul...
Mehrdad Reshadi, Prabhat Mishra
CODES
2005
IEEE
15 years 10 months ago
Improving superword level parallelism support in modern compilers
Multimedia vector instruction sets are becoming ubiquitous in most of the embedded systems used for multimedia, networking and communications. However, current compiler technology...
Christian Tenllado, Luis Piñuel, Manuel Pri...
CSB
2005
IEEE
202views Bioinformatics» more  CSB 2005»
15 years 10 months ago
Head and Neck Cancer Metastasis Prediction via Artificial Neural Networks
Cancers in head and neck tends to spread to nearby lymph nodes. Lymph nodes trap the spreading tumor cells but then the tumor starts to grow in these nodes and then spread further...
Eveleen Darby, Tezeswari Nettimi, Shilpa Kodali, L...
DASFAA
2005
IEEE
157views Database» more  DASFAA 2005»
15 years 10 months ago
Adaptively Detecting Aggregation Bursts in Data Streams
Finding bursts in data streams is attracting much attention in research community due to its broad applications. Existing burst detection methods suffer the problems that 1) the p...
Aoying Zhou, Shouke Qin, Weining Qian
DSN
2005
IEEE
15 years 10 months ago
The Effects of Algorithmic Diversity on Anomaly Detector Performance
Common practice in anomaly-based intrusion detection assumes that one size fits all: a single anomaly detector should detect all anomalies. Compensation for any performance short...
Kymie M. C. Tan, Roy A. Maxion
« Prev « First page 2461 / 2779 Last » Next »