Sciweavers

7576 search results - page 219 / 1516
» UNIX as an Application Program
Sort
View
CAV
2008
Springer
96views Hardware» more  CAV 2008»
15 years 7 months ago
Implied Set Closure and Its Application to Memory Consistency Verification
Hangal et. al. [3] have developed a procedure to check if an instance of the execution of a shared memory multiprocessor program, is consistent with the Total Store Order (TSO) mem...
Surender Baswana, Shashank K. Mehta, Vishal Powar
JTRES
2010
ACM
15 years 5 months ago
Developing safety critical Java applications with oSCJ/L0
We present oSCJ, an implementation of the draft of Safety Critical Java (SCJ) specification. SCJ is designed to make Java amenable to writing mission- and safety-critical software...
Ales Plsek, Lei Zhao, Veysel H. Sahin, Daniel Tang...
JAIR
2008
94views more  JAIR 2008»
15 years 5 months ago
The Ultrametric Constraint and its Application to Phylogenetics
A phylogenetic tree shows the evolutionary relationships among species. Internal nodes of the tree represent speciation events and leaf nodes correspond to species. A goal of phyl...
Neil C. A. Moore, Patrick Prosser
117
Voted
CORR
2004
Springer
223views Education» more  CORR 2004»
15 years 4 months ago
MultiNeuron - Neural Networks Simulator For Medical, Physiological, and Psychological Applications
This work describes neural software applied in medicine and physiology to: - investigate and diagnose immune deficiencies; diagnose and study allergic and pseudoallergic reactions...
Alexander N. Gorban, D. A. Rossiyev, M. G. Dorrer
JMLR
2012
13 years 7 months ago
Approximate Inference in Additive Factorial HMMs with Application to Energy Disaggregation
This paper considers additive factorial hidden Markov models, an extension to HMMs where the state factors into multiple independent chains, and the output is an additive function...
J. Zico Kolter, Tommi Jaakkola