Sciweavers

195 search results - page 19 / 39
» Mining Design Patterns from C Source Code
Sort
View
LCTRTS
2010
Springer
14 years 4 days ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
PRDC
2005
IEEE
14 years 29 days ago
On Automating Failure Mode Analysis and Enhancing its Integrity
This paper reports our experience on the development of a design-for-safety (DFS) workbench called Risk Assessment and Management Environment (RAME) for microelectronic avionics s...
Kam S. Tso, Ann T. Tai, Savio N. Chau, Leon Alkala...
BMCBI
2006
183views more  BMCBI 2006»
13 years 7 months ago
Mining gene expression data by interpreting principal components
Background: There are many methods for analyzing microarray data that group together genes having similar patterns of expression over all conditions tested. However, in many insta...
Joseph C. Roden, Brandon W. King, Diane Trout, Ali...
FAST
2010
13 years 9 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
IPPS
1998
IEEE
13 years 11 months ago
Synthesis of a Systolic Array Genetic Algorithm
The paper presents the design of a hardware genetic algorithm which uses a pipeline of systolic arrays. Demostrated is the design methodology, where a simple genetic algorithm exp...
Graham M. Megson, I. M. Bland