Sciweavers

9503 search results - page 1868 / 1901
» Authenticated System Calls
Sort
View
ISCA
2006
IEEE
144views Hardware» more  ISCA 2006»
13 years 11 months ago
Conditional Memory Ordering
Conventional relaxed memory ordering techniques follow a proactive model: at a synchronization point, a processor makes its own updates to memory available to other processors by ...
Christoph von Praun, Harold W. Cain, Jong-Deok Cho...
CORR
2007
Springer
144views Education» more  CORR 2007»
13 years 11 months ago
Optimization of Information Rate Upper and Lower Bounds for Channels with Memory
—We consider the problem of minimizing upper bounds and maximizing lower bounds on information rates of stationary and ergodic discrete-time channels with memory. The channels we...
Parastoo Sadeghi, Pascal O. Vontobel, Ramtin Shams
DEBU
2007
142views more  DEBU 2007»
13 years 11 months ago
Multi-lingual Indexing Support for CLIR using Language Modeling
An indexing model is the heart of an Information Retrieval (IR) system. Data structures such as term based inverted indices have proved to be very effective for IR using vector sp...
Prasad Pingali, Vasudeva Varma
JEC
2006
100views more  JEC 2006»
13 years 11 months ago
RC-SIMD: Reconfigurable communication SIMD architecture for image processing applications
During the last two decades, Single Instruction Multiple Data (SIMD) processors have become important architectures in embedded systems for image processing applications. The main ...
Hamed Fatemi, Bart Mesman, Henk Corporaal, Twan Ba...
JMLR
2006
389views more  JMLR 2006»
13 years 11 months ago
A Very Fast Learning Method for Neural Networks Based on Sensitivity Analysis
This paper introduces a learning method for two-layer feedforward neural networks based on sensitivity analysis, which uses a linear training algorithm for each of the two layers....
Enrique Castillo, Bertha Guijarro-Berdiñas,...
« Prev « First page 1868 / 1901 Last » Next »