Sciweavers

173 search results - page 14 / 35
» A Geometrical Analysis of Associative Memory
Sort
View
GLVLSI
2008
IEEE
140views VLSI» more  GLVLSI 2008»
14 years 1 months ago
A table-based method for single-pass cache optimization
Due to the large contribution of the memory subsystem to total system power, the memory subsystem is highly amenable to customization for reduced power/energy and/or improved perf...
Pablo Viana, Ann Gordon-Ross, Edna Barros, Frank V...
JSAI
2005
Springer
14 years 27 days ago
Conversational Inverse Information for Context-Based Retrieval of Personal Experiences
Recent development of capture and archival technology for experiences can serve to extend our memory and knowledge and enrich our collaboration with others. Conversation is an impo...
Yasuhiro Katagiri, Mayumi Bono, Noriko Suzuki
CASES
2005
ACM
13 years 9 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua
IBPRIA
2005
Springer
14 years 27 days ago
An Algorithm for the Detection of Multiple Concentric Circles
This paper presents a method for the detection of multiple concentric circles which is based on the Hough Transform (HT). In order to reduce time and memory space the concentric ci...
Margarida Silveira
BIBE
2008
IEEE
100views Bioinformatics» more  BIBE 2008»
14 years 1 months ago
Wavelet entropy differentiations of event related potentials in dyslexia
Abstract—The wavelet entropy (WE) of rest electroencephalogram (EEG) and of event-related potentials (ERP) carries information about the degree of order or disorder associated wi...
Giorgos A. Giannakakis, Nikolaos N. Tsiaparas, Mon...