Sciweavers

7200 search results - page 1235 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
ICMLA
2009
13 years 8 months ago
Alive on Back-feed Culprit Identification via Machine Learning
We describe an application of machine learning techniques toward the problem of predicting which network protector switch is the cause of an Alive on Back-Feed (ABF) event in the ...
Bert C. Huang, Ansaf Salleb-Aouissi, Philip Gross
ICSE
2009
IEEE-ACM
13 years 8 months ago
Architecting Robustness and Timeliness in a New Generation of Aerospace Systems
Aerospace systems have strict dependability and real-time requirements, as well as a need for flexible resource reallocation and reduced size, weight and power consumption. To cope...
José Rufino, João Craveiro, Paulo Ve...
DEBU
2010
173views more  DEBU 2010»
13 years 7 months ago
uFLIP: Understanding the Energy Consumption of Flash Devices
Understanding the energy consumption of flash devices is important for two reasons. First, energy is emerging as a key metric for data management systems. It is thus important to ...
Matias Bjørling, Philippe Bonnet, Luc Bouga...
DMTCS
2010
137views Mathematics» more  DMTCS 2010»
13 years 7 months ago
Deterministic recognizability of picture languages with Wang automata
We present a model of automaton for picture language recognition, called Wang automaton, which is based on labeled Wang tiles. Wang automata combine features of both online tessell...
Violetta Lonati, Matteo Pradella
FCSC
2010
170views more  FCSC 2010»
13 years 7 months ago
Formal verification of concurrent programs with read-write locks
Abstract Read-write locking is an important mechanism to improve concurrent granularity, but it is difficult to reason about the safety of concurrent programs with read-write locks...
Ming Fu, Yu Zhang, Yong Li
« Prev « First page 1235 / 1440 Last » Next »