Sciweavers

7200 search results - page 94 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
14 years 4 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
HPCA
2005
IEEE
14 years 3 months ago
Power Efficient Processor Architecture and The Cell Processor
This paper provides a background and rationale for some of the architecture and design decisions in the Cell processor, a processor optimized for compute-intensive and broadband r...
H. Peter Hofstee
FOCS
1997
IEEE
14 years 2 months ago
On the Power of Quantum Finite State Automata
In this paper, we introduce 1-way and 2-way quantum nite state automata (1qfa's and 2qfa's), which are the quantum analogues of deterministic, nondeterministic and proba...
Attila Kondacs, John Watrous
CF
2005
ACM
13 years 12 months ago
Power and performance optimization at the system level
Valentina Salapura, Randy Bickford, Matthias A. Bl...
MFCS
2010
Springer
13 years 8 months ago
Harnessing MLF with the Power of System F
We provide a strong normalization result for MLF , a type system generalizing ML with first-class polymorphism as in system F. The proof is achieved by translating MLF into a calc...
Giulio Manzonetto, Paolo Tranquilli