The growing processor/memory performance gap causes the performance of many codes to be limited by memory accesses. If known to exist in an application, strided memory accesses fo...
Tushar Mohan, Bronis R. de Supinski, Sally A. McKe...
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Background: Protein-protein interaction (PPI) databases have become a major resource for investigating biological networks and pathways in cells. A number of publicly available re...
Suresh Mathivanan, Balamurugan Periaswamy, T. K. B...
Based on the observation that it is relatively easier for users to generate several good transfer functions (TFs) for different features of volumetric data, we propose TF fusing, ...
Yingcai Wu, Huamin Qu, Hong Zhou, Ming-Yuen Cha...
Breakdown analysis involves decomposing data into subgroups to allow for comparison and identification of problem areas. Good analysis requires the ability to group data based on ...
Sandeep Prabhakar, Nathan Conklin, Chris North, Mu...