Sciweavers

69 search results - page 6 / 14
» A closer look at constraints as processes
Sort
View
IPPS
2009
IEEE
14 years 2 months ago
Efficient microarchitecture policies for accurately adapting to power constraints
In the past years Dynamic Voltage and Frequency Scaling (DVFS) has been an effective technique that allowed microprocessors to match a predefined power budget. However, as process...
Juan M. Cebrian, Juan L. Aragón, José...
ICARIS
2005
Springer
14 years 26 days ago
Polymorphism and Danger Susceptibility of System Call DASTONs
We have proposed a metaphor “DAnger Susceptible daTa codON” (DASTON) in data subject to processing by Danger Theory (DT) based Artificial Immune System (DAIS). The DASTONs are ...
Anjum Iqbal, Mohd Aizaini Maarof
PR
2008
130views more  PR 2008»
13 years 7 months ago
Active semi-supervised fuzzy clustering
Clustering algorithms are increasingly employed for the categorization of image databases, in order to provide users with database overviews and make their access more effective. ...
Nizar Grira, Michel Crucianu, Nozha Boujemaa
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
14 years 1 months ago
The Tension between Integration and Fragmentation in a Component Based Software Development Ecosystem
Historically, software application systems have been produced either individually tailored for the specific customer, or they have been adapted from standardized packages. This pa...
Jens-Magnus Arndt, Jens Dibbern
ICDCSW
2006
IEEE
14 years 1 months ago
Dimension-Based Subscription Pruning for Publish/Subscribe Systems
Subscription pruning has been proven as valuable routing optimization for Boolean subscriptions in publish/subscribe systems. It aims at optimizing subscriptions independently of ...
Sven Bittner, Annika Hinze