Sciweavers

885 search results - page 155 / 177
» An investigation of the performance of various dynamic sched...
Sort
View
LCTRTS
2010
Springer
14 years 1 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
COMGEO
1999
ACM
13 years 8 months ago
Simplifying spline models
We present a new approach for simplifying models composed of rational spline patches. Given an input model, the algorithm computes a new approximation of the model in terms of cub...
M. Gopi, Dinesh Manocha
AISS
2010
130views more  AISS 2010»
13 years 6 months ago
Neural Network Modeling for Proton Exchange Membrane Fuel Cell (PEMFC)
This paper presents the artificial intelligence techniques to control a proton exchange membrane fuel cell system process using particularly a methodology of dynamic neural networ...
Youssef M. ElSayed, Moataz H. Khalil, Khairia E. A...
IWQOS
2004
Springer
14 years 2 months ago
Service availability: a new approach to characterize IP backbone topologies
— Traditional SLAs, defined by average delay or packet loss, often camouflage the instantaneous performance perceived by end-users. We define a set of metrics for service avai...
Ram Keralapura, Chen-Nee Chuah, Gianluca Iannaccon...
IJCAI
1989
13 years 9 months ago
Functional Representation of Designs and Redesign Problem Solving
gn problem can be abstractly characterized as a constrained function-to-structure mapping. The de­ sign task takes as input the specifications of the desired functions of a device...
Ashok K. Goel, B. Chandrasekaran