Sciweavers

753 search results - page 58 / 151
» Fragments-based Model Reduction: Some Case Studies
Sort
View
ISCA
1991
IEEE
162views Hardware» more  ISCA 1991»
14 years 12 days ago
Comparison of Hardware and Software Cache Coherence Schemes
We use mean value analysis models to compare representative hardware and software cache coherence schemes for a large-scale shared-memory system. Our goal is to identify the workl...
Sarita V. Adve, Vikram S. Adve, Mark D. Hill, Mary...
TFCV
1994
13 years 10 months ago
Attentive Visual Motion Processing: Computations in the Log-Polar Plane
Attentive vision is characterized by selective sensing in space and time as well as selective processing with respect to a speci c task. Selection in space involves the splitting ...
Konstantinos Daniilidis
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 3 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
JC
2000
138views more  JC 2000»
13 years 8 months ago
Multivariate Polynomials, Duality, and Structured Matrices
We rst review thebasic properties of the well knownclasses of Toeplitz, Hankel, Vandermonde, and other related structured matrices and reexamine their correlation to operations wi...
Bernard Mourrain, Victor Y. Pan
ENVSOFT
2006
131views more  ENVSOFT 2006»
13 years 9 months ago
Hydrological models are so good, do we still need data?
Our ability to numerically model natural systems has progressed enormously over the last 10e20 years. During the last decade computational power has increased to the stage where w...
R. P. Silberstein