Sciweavers

43264 search results - page 126 / 8653
» Comparing models of computation
Sort
View
ACSAC
2004
IEEE
14 years 20 days ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
NIPS
2004
13 years 10 months ago
Reducing Spike Train Variability: A Computational Theory Of Spike-Timing Dependent Plasticity
Experimental studies have observed synaptic potentiation when a presynaptic neuron fires shortly before a postsynaptic neuron, and synaptic depression when the presynaptic neuron ...
Sander M. Bohte, Michael C. Mozer
IPL
1998
80views more  IPL 1998»
13 years 8 months ago
The Economics of Large-Memory Computations
We propose, and justify, an economic theory to guide memory system design, operation, and analysis. Our theory treats memory random-access latency, and its cost per installed mega...
Clark D. Thomborson
FLAIRS
2009
13 years 6 months ago
A Comparative Study of Variable Elimination and Arc Reversal in Bayesian Network Inference
We compare two approaches to Bayesian network inference, called variable elimination (VE) and arc reversal (AR). It is established that VE never requires more space than AR, and n...
Cory J. Butz, Junying Chen, Ken Konkel, Pawan Ling...
GLVLSI
2009
IEEE
122views VLSI» more  GLVLSI 2009»
14 years 3 months ago
Enhancing SAT-based sequential depth computation by pruning search space
The sequential depth determines the completeness of bounded model checking in design verification. Recently, a SATbased method is proposed to compute the sequential depth of a de...
Yung-Chih Chen, Chun-Yao Wang