Sciweavers

2421 search results - page 471 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
TVLSI
2008
150views more  TVLSI 2008»
13 years 8 months ago
Data Memory Subsystem Resilient to Process Variations
As technology scales, more sophisticated fabrication processes cause variations in many different parameters in the device. These variations could severely affect the performance o...
M. Bennaser, Yao Guo, Csaba Andras Moritz
DAC
2000
ACM
14 years 9 months ago
Unifying behavioral synthesis and physical design
eously demand shorter and less costly design cycles. Designing at higher levels of abstraction makes both objectives achievable, but enabling techniques like behavioral synthesis h...
William E. Dougherty, Donald E. Thomas
ICS
2004
Tsinghua U.
14 years 2 months ago
Scaling the issue window with look-ahead latency prediction
In contemporary out-of-order superscalar design, high IPC is mainly achieved by exposing high instruction level parallelism (ILP). Scaling issue window size can certainly provide ...
Yongxiang Liu, Anahita Shayesteh, Gokhan Memik, Gl...
ISCI
2008
166views more  ISCI 2008»
13 years 8 months ago
Incremental and interactive mining of web traversal patterns
Web mining involves the application of data mining techniques to large amounts of web-related data in order to improve web services. Web traversal pattern mining involves discover...
Yue-Shi Lee, Show-Jane Yen
PR
2008
97views more  PR 2008»
13 years 8 months ago
A vision-based method for weeds identification through the Bayesian decision theory
One of the objectives of precision agriculture is to minimize the volume of herbicides that are applied to the fields through the use of site-specific weed management systems. Thi...
Alberto Tellaeche, Xavier P. Burgos-Artizzu, Gonza...