Sciweavers

10700 search results - page 373 / 2140
» Generative Design Patterns
Sort
View
VLSID
2008
IEEE
133views VLSI» more  VLSID 2008»
16 years 4 months ago
Exhaustive Enumeration of Legal Custom Instructions for Extensible Processors
Today's customizable processors allow the designer to augment the base processor with custom accelerators. By choosing appropriate set of accelerators, designer can significa...
Nagaraju Pothineni, Anshul Kumar, Kolin Paul
159
Voted
GLVLSI
2009
IEEE
170views VLSI» more  GLVLSI 2009»
15 years 7 months ago
Physical unclonable function and true random number generator: a compact and scalable implementation
Physical Unclonable Functions (PUF) and True Random Number Generators (TRNG) are two very useful components in secure system design. PUFs can be used to extract chip-unique signat...
Abhranil Maiti, Raghunandan Nagesh, Anand Reddy, P...
128
Voted
VIZSEC
2005
Springer
15 years 9 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
KDD
2012
ACM
190views Data Mining» more  KDD 2012»
13 years 6 months ago
Multi-label hypothesis reuse
Multi-label learning arises in many real-world tasks where an object is naturally associated with multiple concepts. It is well-accepted that, in order to achieve a good performan...
Sheng-Jun Huang, Yang Yu, Zhi-Hua Zhou
133
Voted
BMCBI
2008
128views more  BMCBI 2008»
15 years 3 months ago
Meta-analysis of breast cancer microarray studies in conjunction with conserved cis-elements suggest patterns for coordinate reg
Background: Gene expression measurements from breast cancer (BrCa) tumors are established clinical predictive tools to identify tumor subtypes, identify patients showing poor/good...
David D. Smith, Pål Sætrom, Ola R. Sn&...