Sciweavers

2421 search results - page 398 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
DSD
2011
IEEE
194views Hardware» more  DSD 2011»
12 years 9 months ago
Reliability-Aware Design Optimization for Multiprocessor Embedded Systems
—This paper presents an approach for the reliability-aware design optimization of real-time systems on multi-processor platforms. The optimization is based on an extension of wel...
Jia Huang, Jan Olaf Blech, Andreas Raabe, Christia...
KDD
2008
ACM
174views Data Mining» more  KDD 2008»
14 years 10 months ago
Effective label acquisition for collective classification
Information diffusion, viral marketing, and collective classification all attempt to model and exploit the relationships in a network to make inferences about the labels of nodes....
Mustafa Bilgic, Lise Getoor
BMCBI
2005
84views more  BMCBI 2005»
13 years 10 months ago
A note on generalized Genome Scan Meta-Analysis statistics
Background: Wise et al. introduced a rank-based statistical technique for meta-analysis of genome scans, the Genome Scan Meta-Analysis (GSMA) method. Levinson et al. recently desc...
James A. Koziol, Anne C. Feng
ICCAD
2006
IEEE
141views Hardware» more  ICCAD 2006»
14 years 7 months ago
A code refinement methodology for performance-improved synthesis from C
Although many recent advances have been made in hardware synthesis techniques from software programming languages such as C, the performance of synthesized hardware commonly suffe...
Greg Stitt, Frank Vahid, Walid A. Najjar
LION
2007
Springer
192views Optimization» more  LION 2007»
14 years 4 months ago
Learning While Optimizing an Unknown Fitness Surface
This paper is about Reinforcement Learning (RL) applied to online parameter tuning in Stochastic Local Search (SLS) methods. In particular a novel application of RL is considered i...
Roberto Battiti, Mauro Brunato, Paolo Campigotto