Sciweavers

3639 search results - page 139 / 728
» Provenance as Dependency Analysis
Sort
View
MICRO
2000
IEEE
98views Hardware» more  MICRO 2000»
15 years 2 months ago
The store-load address table and speculative register promotion
Register promotion is an optimization that allocates a value to a register for a region of its lifetime where it is provably not aliased. Conventional compiler analysis cannot alw...
Matt Postiff, David Greene, Trevor N. Mudge
ICASSP
2010
IEEE
14 years 8 months ago
Flexible complex ICA of fMRI data
Data-driven analysis methods, in particular independent component analysis (ICA) has proven quite useful for the analysis of functional magnetic imaging (fMRI) data. In addition, ...
Hualiang Li, Tülay Adali, Nicolle M. Correa, ...
IPPS
1998
IEEE
15 years 2 months ago
Configuration Independent Analysis for Characterizing Shared-Memory Applications
Characterizing shared-memory applications provides insight to design efficient systems, and provides awareness to identify and correct application performance bottlenecks. Configu...
Gheith A. Abandah, Edward S. Davidson
TACAS
2000
Springer
134views Algorithms» more  TACAS 2000»
15 years 1 months ago
Integrating Low Level Symmetries into Reachability Analysis
We present three methods for the integration of symmetries into reachability analysis. Two of them lead to perfect reduction but their runtime depends on the symmetry structure. Th...
Karsten Schmidt 0004
PAMI
2006
206views more  PAMI 2006»
14 years 10 months ago
Fast Active Appearance Model Search Using Canonical Correlation Analysis
A fast AAM search algorithm based on canonical correlation analysis (CCA-AAM) is introduced. It efficiently models the dependency between texture residuals and model parameters dur...
Rene Donner, Michael Reiter, Georg Langs, Philipp ...