Sciweavers

78 search results - page 16 / 16
» Improved procedure placement for set associative caches
Sort
View
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
15 years 7 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
TR
2010
140views Hardware» more  TR 2010»
14 years 8 months ago
Modeling Failure Modes for Residual Life Prediction Using Stochastic Filtering Theory
This paper reports on a theoretical Bayesian modeling development for residual life prediction in the context of condition-based maintenance. At each monitoring point during a comp...
Matthew J. Carr, Wenbin Wang
IPM
2007
145views more  IPM 2007»
15 years 1 months ago
Text mining techniques for patent analysis
Patent documents contain important research results. However, they are lengthy and rich in technical terminology such that it takes a lot of human efforts for analyses. Automatic...
Yuen-Hsien Tseng, Chi-Jen Lin, Yu-I Lin