Sciweavers

1620 search results - page 247 / 324
» Use Case Level Pointcuts
Sort
View
DSD
2008
IEEE
147views Hardware» more  DSD 2008»
15 years 29 days ago
A Low-Cost Cache Coherence Verification Method for Snooping Systems
Due to modern technology trends such as decreasing feature sizes and lower voltage levels, fault tolerance is becoming increasingly important in computing systems. Shared memory i...
Demid Borodin, Ben H. H. Juurlink
ELPUB
2008
ACM
15 years 29 days ago
The Role of Academic Libraries in Building Open Communities of Scholars
This paper describes three important pillars of publishing programs emerging at university libraries: providing a robust publishing platform, engaging the academic community in di...
Kevin Stranack, Gwen Bird, Rea Devakos
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
15 years 18 days ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
AAAI
2004
15 years 18 days ago
Distance Estimates for Planning in the Discrete Belief Space
We present a general framework for studying heuristics for planning in the belief space. Earlier work has focused on giving implementations of heuristics that work well on benchma...
Jussi Rintanen
ERSA
2006
111views Hardware» more  ERSA 2006»
15 years 17 days ago
Promises and Pitfalls of Reconfigurable Supercomputing
Reconfigurable supercomputing (RSC) combines programmable logic chips with high performance microprocessors, all communicating over a high bandwidth, low latency interconnection n...
Maya Gokhale, Christopher Rickett, Justin L. Tripp...