Sciweavers

5252 search results - page 879 / 1051
» Logic in Access Control
Sort
View
MICRO
2002
IEEE
128views Hardware» more  MICRO 2002»
15 years 9 months ago
Compiler-directed instruction cache leakage optimization
Excessive power consumption is widely considered as a major impediment to designing future microprocessors. With the continued scaling down of threshold voltages, the power consum...
Wei Zhang 0002, Jie S. Hu, Vijay Degalahal, Mahmut...
GECCO
2010
Springer
196views Optimization» more  GECCO 2010»
15 years 9 months ago
Using synthetic test suites to empirically compare search-based and greedy prioritizers
The increase in the complexity of modern software has led to the commensurate growth in the size and execution time of the test suites for these programs. In order to address this...
Zachary D. Williams, Gregory M. Kapfhammer
SAC
2009
ACM
15 years 9 months ago
Towards developing a trust-based security solution
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small...
Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Shari...
EUROPAR
2009
Springer
15 years 9 months ago
Last Bank: Dealing with Address Reuse in Non-Uniform Cache Architecture for CMPs
In response to the constant increase in wire delays, Non-Uniform Cache Architecture (NUCA) has been introduced as an effective memory model for dealing with growing memory latenci...
Javier Lira, Carlos Molina, Antonio Gonzále...
IWINAC
2009
Springer
15 years 9 months ago
Results of an Adaboost Approach on Alzheimer's Disease Detection on MRI
Abstract. In this paper we explore the use of the Voxel-based Morphometry (VBM) detection clusters to guide the feature extraction processes for the detection of Alzheimer's d...
Alexandre Savio, Maite García-Sebasti&aacut...