Sciweavers

819 search results - page 66 / 164
» BSN Simulator: Optimizing Application Using System Level Sim...
Sort
View
127
Voted
PARLE
1994
15 years 6 months ago
Using Reference Counters in Update-Based Coherent Memory
Abstract. As the disparity between processor and memory speed continues to widen, the exploitation of locality of reference in shared-memory multiprocessors becomes an increasingly...
Evangelos P. Markatos, Catherine E. Chronaki
120
Voted
VLSID
1999
IEEE
97views VLSI» more  VLSID 1999»
15 years 6 months ago
A New Methodology for Concurrent Technology Development and Cell Library Optimization
To minimize the time to market and cost of new sub 0.25um process technologies and products, PDF Solutions, Inc., has developed a new comprehensive approach based on the use of pr...
Marko P. Chew, Sharad Saxena, Thomas F. Cobourn, P...
114
Voted
HPCA
2003
IEEE
16 years 3 months ago
Dynamic Optimization of Micro-Operations
Inherent within complex instruction set architectures such as x86 are inefficiencies that do not exist in a simpler ISAs. Modern x86 implementations decode instructions into one o...
Brian Slechta, David Crowe, Brian Fahs, Michael Fe...
104
Voted
ANSS
1998
IEEE
15 years 6 months ago
On Interval Weighted Three-Layer Neural Networks
In solving application problems, the data sets used to train a neural network may not be hundred percent precise but within certain ranges. Representing data sets with intervals, ...
Mohsen Beheshti, Ali Berrached, André de Ko...
134
Voted
ACSAC
1999
IEEE
15 years 7 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer