Sciweavers

4763 search results - page 882 / 953
» On the Execution of Deep Models
Sort
View
COMSWARE
2007
IEEE
15 years 6 months ago
OASiS: A Programming Framework for Service-Oriented Sensor Networks
Abstract— Wireless sensor networks consist of small, inexpensive devices which interact with the environment, communicate with each other, and perform distributed computations in...
Manish Kushwaha, Isaac Amundson, Xenofon D. Koutso...
ESCIENCE
2007
IEEE
15 years 6 months ago
Distributed and Generic Maximum Likelihood Evaluation
This paper presents GMLE 1 , a generic and distributed framework for maximum likelihood evaluation. GMLE is currently being applied to astroinformatics for determining the shape o...
Travis J. Desell, Nathan Cole, Malik Magdon-Ismail...
IEEEPACT
2007
IEEE
15 years 6 months ago
JudoSTM: A Dynamic Binary-Rewriting Approach to Software Transactional Memory
With the advent of chip-multiprocessors, we are faced with the challenge of parallelizing performance-critical software. Transactional memory (TM) has emerged as a promising progr...
Marek Olszewski, Jeremy Cutler, J. Gregory Steffan
91
Voted
ISCA
2007
IEEE
120views Hardware» more  ISCA 2007»
15 years 6 months ago
Examining ACE analysis reliability estimates using fault-injection
ACE analysis is a technique to provide an early reliability estimate for microprocessors. ACE analysis couples data from performance models with low level design details to identi...
Nicholas J. Wang, Aqeel Mahesri, Sanjay J. Patel
DRM
2007
Springer
15 years 5 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen