Sciweavers

4757 search results - page 790 / 952
» Generalized Posynomial Performance Modeling
Sort
View
GLVLSI
2002
IEEE
109views VLSI» more  GLVLSI 2002»
14 years 3 months ago
Minimizing resources in a repeating schedule for a split-node data-flow graph
Many computation-intensive or recursive applications commonly found in digital signal processing and image processing applications can be represented by data-flow graphs (DFGs). ...
Timothy W. O'Neil, Edwin Hsing-Mean Sha
ICNP
2002
IEEE
14 years 3 months ago
Analysis of the MED Oscillation Problem in BGP
The Multi Exit Discriminator (MED) attribute of the Border Gateway Protocol (BGP) is widely used to implement “cold potato routing” between autonomous systems. However, the us...
Timothy Griffin, Gordon T. Wilfong
INTERACTION
2009
ACM
14 years 3 months ago
RoboEarth: connecting robots worldwide
In this paper, we present the core concept and the benefits of an approach called RoboEarth which will be highly beneficial for future robotic applications in science and industry...
Oliver Zweigle, René van de Molengraft, Raf...
ISLPED
2009
ACM
154views Hardware» more  ISLPED 2009»
14 years 3 months ago
Experimental analysis of sequence dependence on energy saving for error tolerant image processing
We present experimental analysis to exploit the sequence dependence on energy saving in error tolerant image processing. Our analysis shows that the error distributions depend not...
Se Hun Kim, Saibal Mukhopadhyay, Wayne Wolf
RECSYS
2009
ACM
14 years 3 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley