Sciweavers

443 search results - page 30 / 89
» Transductive optimal component analysis
Sort
View
91
Voted
CSSE
2006
IEEE
15 years 17 days ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
TC
1998
15 years 5 days ago
Performance Evaluation and Cost Analysis of Cache Protocol Extensions for Shared-Memory Multiprocessors
—We evaluate three extensions to directory-based cache coherence protocols in shared-memory multiprocessors. These extensions are aimed at reducing the penalties associated with ...
Fredrik Dahlgren, Michel Dubois, Per Stenströ...
DOCENG
2009
ACM
15 years 7 months ago
Deriving image-text document surrogates to optimize cognition
The representation of information collections needs to be optimized for human cognition. While documents often include rich visual components, collections, including personal coll...
Eunyee Koh, Andruid Kerne
ICCAD
1994
IEEE
144views Hardware» more  ICCAD 1994»
15 years 4 months ago
Power analysis of embedded software: a first step towards software power minimization
Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical com...
Vivek Tiwari, Sharad Malik, Andrew Wolfe
87
Voted
DAC
2000
ACM
16 years 1 months ago
Power analysis of embedded operating systems
The increasing complexity and software content of embedded systems has led to the common use of sophisticated system software that helps applications use the underlying hardware r...
Robert P. Dick, Ganesh Lakshminarayana, Anand Ragh...