Sciweavers

810 search results - page 101 / 162
» Modeling User Runtime Estimates
Sort
View
IWMM
2009
Springer
130views Hardware» more  IWMM 2009»
14 years 4 months ago
A component model of spatial locality
Good spatial locality alleviates both the latency and bandwidth problem of memory by boosting the effect of prefetching and improving the utilization of cache. However, convention...
Xiaoming Gu, Ian Christopher, Tongxin Bai, Chengli...
IJCAI
2007
13 years 11 months ago
A Decision-Theoretic Model of Assistance
There is a growing interest in intelligent assistants for a variety of applications from organizing tasks for knowledge workers to helping people with dementia. In this paper, we ...
Alan Fern, Sriraam Natarajan, Kshitij Judah, Prasa...
CDC
2009
IEEE
110views Control Systems» more  CDC 2009»
13 years 8 months ago
Perturbation analysis and optimization of multiclass multiobjective Stochastic Flow Models
Stochastic Flow Models (SFMs) are stochastic ystems that abstract the dynamics of complex discrete event systems involving the control of sharable resources. SFMs have been used to...
Chen Yao, Christos G. Cassandras
TOG
2012
253views Communications» more  TOG 2012»
12 years 17 days ago
Exploring collections of 3D models using fuzzy correspondences
Large collections of 3D models from the same object class (e.g., chairs, cars, animals) are now commonly available via many public repositories, but exploring the range of shape v...
Vladimir G. Kim, Wilmot Li, Niloy J. Mitra, Stephe...
IWSEC
2009
Springer
14 years 4 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...