Sciweavers

1720 search results - page 283 / 344
» Evaluation of a High Performance Code Compression Method
Sort
View
PPOPP
2005
ACM
15 years 8 months ago
Exposing speculative thread parallelism in SPEC2000
As increasing the performance of single-threaded processors becomes increasingly difficult, consumer desktop processors are moving toward multi-core designs. One way to enhance th...
Manohar K. Prabhu, Kunle Olukotun
141
Voted
DSP
2008
15 years 1 months ago
On statistical approaches to target silhouette classification in difficult conditions
In this paper we present a methodical evaluation of the performance of a new and two traditional approaches to automatic target recognition (ATR) based on silhouette representatio...
Conrad Sanderson, Danny Gibbins, Stephen Searle
JMLR
2006
132views more  JMLR 2006»
15 years 2 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
HPCA
2000
IEEE
15 years 7 months ago
A Prefetching Technique for Irregular Accesses to Linked Data Structures
Prefetching offers the potential to improve the performance of linked data structure (LDS) traversals. However, previously proposed prefetching methods only work well when there i...
Magnus Karlsson, Fredrik Dahlgren, Per Stenstr&oum...
GECCO
2005
Springer
102views Optimization» more  GECCO 2005»
15 years 8 months ago
Latent variable crossover for k-tablet structures and its application to lens design problems
This paper presents the Real-coded Genetic Algorithms for high-dimensional ill-scaled structures, what is called, the ktablet structure. The k-tablet structure is the landscape th...
Jun Sakuma, Shigenobu Kobayashi