Sciweavers

1015 search results - page 145 / 203
» On Information Regularization
Sort
View
CODES
2006
IEEE
15 years 11 months ago
Layout aware design of mesh based NoC architectures
Design of System-on-Chip (SoC) with regular mesh based Network-on-Chip (NoC) consists of mapping processing cores to routers, and routing of the traffic traces on the topology suc...
Krishnan Srinivasan, Karam S. Chatha
170
Voted
IJCNN
2006
IEEE
15 years 11 months ago
Nonlinear principal component analysis of noisy data
With very noisy data, having plentiful samples eliminates overfitting in nonlinear regression, but not in nonlinear principal component analysis (NLPCA). To overcome this problem...
William W. Hsieh
122
Voted
VL
2006
IEEE
106views Visual Languages» more  VL 2006»
15 years 11 months ago
A Linguistic Analysis of How People Describe Software Problems
There is little understanding of how people describe software problems, but a variety of tools solicit, manage, and analyze these descriptions in order to streamline software deve...
Andrew J. Ko, Brad A. Myers, Duen Horng Chau
CBMS
2005
IEEE
15 years 10 months ago
A Practical Tool for Visualizing and Data Mining Medical Time Series
The increasing interest in time series data mining has had surprisingly little impact on real world medical applications. Practitioners who work with time series on a daily basis ...
Li Wei, Nitin Kumar, Venkata Nishanth Lolla, Eamon...
123
Voted
DSN
2005
IEEE
15 years 10 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...