Sciweavers

2028 search results - page 136 / 406
» Deriving Relation Keys from XML Keys
Sort
View
HPCA
2009
IEEE
16 years 5 months ago
Versatile prediction and fast estimation of Architectural Vulnerability Factor from processor performance metrics
The shrinking processor feature size, lower threshold voltage and increasing clock frequency make modern processors highly vulnerable to transient faults. Architectural Vulnerabil...
Lide Duan, Bin Li, Lu Peng
CIE
2007
Springer
15 years 10 months ago
From Logic to Physics: How the Meaning of Computation Changed over Time
The intuition guiding the de…nition of computation has shifted over time, a process that is re‡ected in the changing formulations of the Church-Turing thesis. The theory of co...
Itamar Pitowsky
TNN
2011
107views more  TNN 2011»
14 years 11 months ago
Iterative Gaussianization: From ICA to Random Rotations
Abstract—Most signal processing problems involve the challenging task of multidimensional probability density function (PDF) estimation. In this paper, we propose a solution to t...
Valero Laparra, Gustavo Camps-Valls, Jesus Malo
GEOINFO
2004
15 years 5 months ago
Temporal Constraints Between Cyclic Geographic Events
Abstract: This paper presents a data model for cyclic geographic events useful for nextgeneration geographic information system design. The paper introduces a structure that captur...
Jorge Campos, Kathleen Hornsby
SIAMCOMP
2008
107views more  SIAMCOMP 2008»
15 years 4 months ago
Holographic Algorithms
Leslie Valiant recently proposed a theory of holographic algorithms. These novel algorithms achieve exponential speed-ups for certain computational problems compared to naive algo...
Leslie G. Valiant