Sciweavers

761 search results - page 120 / 153
» Design and Analysis of a Robust Pipelined Memory System
Sort
View
MICRO
2008
IEEE
118views Hardware» more  MICRO 2008»
14 years 2 months ago
Notary: Hardware techniques to enhance signatures
Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk...
Luke Yen, Stark C. Draper, Mark D. Hill
PADL
2004
Springer
14 years 29 days ago
Improved Compilation of Prolog to C Using Moded Types and Determinism Information
We describe the current status of and provide performance results for a prototype compiler of Prolog to C, ciaocc. ciaocc is novel in that it is designed to accept different kinds...
José F. Morales, Manuel Carro, Manuel V. He...
GECCO
2008
Springer
261views Optimization» more  GECCO 2008»
13 years 8 months ago
SSNNS -: a suite of tools to explore spiking neural networks
We are interested in engineering smart machines that enable backtracking of emergent behaviors. Our SSNNS simulator consists of hand-picked tools to explore spiking neural network...
Heike Sichtig, J. David Schaffer, Craig B. Laramee
CLEAR
2007
Springer
157views Biometrics» more  CLEAR 2007»
14 years 1 months ago
Multispeaker Localization and Tracking in Intelligent Environments
Automatic speaker localization is an important task in several applications such as acoustic scene analysis, hands-free videoconferencing orspeechenhancement.Trackingspeakersinmult...
Carlos Segura, Alberto Abad, Javier Hernando, Clim...
AI
2000
Springer
13 years 7 months ago
On agent-based software engineering
Agent-based computing represents an exciting new synthesis both for Artificial Intelligence (AI) and, more generally, Computer Science. It has the potential to significantly impro...
Nicholas R. Jennings