Sciweavers

3965 search results - page 747 / 793
» Effectivity of Regular Spaces
Sort
View
DATE
2006
IEEE
84views Hardware» more  DATE 2006»
14 years 4 months ago
Vulnerability analysis of L2 cache elements to single event upsets
Memory elements are the most vulnerable system component to soft errors. Since memory elements in cache arrays consume a large fraction of the die in modern microprocessors, the p...
Hossein Asadi, Vilas Sridharan, Mehdi Baradaran Ta...
ICAC
2006
IEEE
14 years 4 months ago
A Hybrid Reinforcement Learning Approach to Autonomic Resource Allocation
— Reinforcement Learning (RL) provides a promising new approach to systems performance management that differs radically from standard queuing-theoretic approaches making use of ...
Gerald Tesauro, Nicholas K. Jong, Rajarshi Das, Mo...
ICMCS
2006
IEEE
151views Multimedia» more  ICMCS 2006»
14 years 4 months ago
A Robust Method for TV Logo Tracking in Video Streams
Most broadcast stations rely on TV logos to claim video content ownership or visually distinguish the broadcast from the interrupting commercial block. Detecting and tracking a TV...
Jinqiao Wang, Lingyu Duan, Zhenglong Li, Jing Liu,...
ICTAI
2006
IEEE
14 years 4 months ago
On the Relationships between Clustering and Spatial Co-location Pattern Mining
The goal of spatial co-location pattern mining is to find subsets of spatial features frequently located together in spatial proximity. Example co-location patterns include servi...
Yan Huang, Pusheng Zhang
IEEEPACT
2006
IEEE
14 years 3 months ago
An empirical evaluation of chains of recurrences for array dependence testing
Code restructuring compilers rely heavily on program analysis techniques to automatically detect data dependences between program statements. Dependences between statement instanc...
Johnnie Birch, Robert A. van Engelen, Kyle A. Gall...