Sciweavers

534 search results - page 80 / 107
» Diameter critical graphs
Sort
View
CC
2009
Springer
153views System Software» more  CC 2009»
14 years 10 months ago
Register Spilling and Live-Range Splitting for SSA-Form Programs
Register allocation decides which parts of a variable's live range are held in registers and which in memory. The compiler inserts spill code to move the values of variables b...
Matthias Braun, Sebastian Hack
VLSID
2002
IEEE
105views VLSI» more  VLSID 2002»
14 years 10 months ago
A Heuristic for Clock Selection in High-Level Synthesis
Clock selection has a significant impact on the performance and quality of designs in high-level synthesis. In most synthesis systems, a convenient value of the clock is chosen or...
J. Ramanujam, Sandeep Deshpande, Jinpyo Hong, Mahm...
BIBE
2009
IEEE
210views Bioinformatics» more  BIBE 2009»
14 years 4 months ago
Analysis of Autism Prevalence and Neurotoxins Using Combinatorial Fusion and Association Rule Mining
- The increase in autism prevalence has been the motivation for much research which has produced various theories for its causation. Genetic and environmental factors have been inv...
Christina Schweikert, Yanjun Li, David Dayya, Davi...
WEA
2009
Springer
111views Algorithms» more  WEA 2009»
14 years 4 months ago
A Heuristic for Fair Correlation-Aware Resource Placement
Abstract. The configuration of network resources greatly impacts the communication overhead for data intensive tasks and constitutes a critical problem in the design and maintenan...
Raouf Boutaba, Martin Karsten, Maxwell Young
CIDM
2009
IEEE
14 years 4 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder