Sciweavers

2186 search results - page 61 / 438
» Considering an Organization's Memory
Sort
View
UM
2005
Springer
14 years 2 months ago
Temporal Blurring: A Privacy Model for OMS Users
Stereotypes and clustering are some techniques for creating user models from user behavior. Yet, they possess important risks as users actions could be misinterpreted or users coul...
Rosa Alarcón, Luis A. Guerrero, José...
ISLPED
1997
ACM
114views Hardware» more  ISLPED 1997»
14 years 1 months ago
Analysis of power consumption in memory hierarchies
In this paper, we note and analyze a key trade-off: as the complexity of caches increases (higher set-associativity, larger block size, and larger overall size), the power consume...
Patrick Hicks, Matthew Walnock, Robert Michael Owe...
FPL
2010
Springer
146views Hardware» more  FPL 2010»
13 years 7 months ago
Software Managed Distributed Memories in MPPAs
When utilizing reconfigurable hardware there are many applications that will require more memory than is available in a single hardware block. While FPGAs have tools and mechanisms...
Robin Panda, Jimmy Xu, Scott Hauck
ICRA
2006
IEEE
93views Robotics» more  ICRA 2006»
14 years 3 months ago
A SVM-based Method for Engine Maintenance Strategy Optimization
— Due to the abundant application background, the optimization of maintenance problem has been extensively studied in the past decades. Besides the well-known difficulty of larg...
Qing-Shan Jia, Qianchuan Zhao
CONCUR
2009
Springer
14 years 28 days ago
Weak Time Petri Nets Strike Back!
We consider the model of Time Petri Nets where time is associated with transitions. Two semantics for time elapsing can be considered: the strong one, for which all transitions are...
Pierre-Alain Reynier, Arnaud Sangnier