Sciweavers

939 search results - page 129 / 188
» Performance Analysis of Shared-Memory Parallel Applications ...
Sort
View
IDA
2009
Springer
14 years 1 months ago
Visualization-Driven Structural and Statistical Analysis of Turbulent Flows
Knowledge extraction from data volumes of ever increasing size requires ever more flexible tools to facilitate interactive query. Interactivity enables real-time hypothesis testin...
Kenny Gruchalla, Mark Rast, Elizabeth Bradley, Joh...
JPDC
2011
129views more  JPDC 2011»
13 years 3 months ago
Static timing analysis for modeling QoS in networks-on-chip
Networks-on-chip (NoCs) are used in a growing number of SoCs and multi-core processors. Because messages compete for the NoC’s shared resources, quality of service and resource ...
Evgeni Krimer, Isaac Keslassy, Avinoam Kolodny, Is...
ICANN
2001
Springer
14 years 1 months ago
Independent Variable Group Analysis
Humans tend to group together related properties in order to understand complex phenomena. When modeling large problems with limited representational resources, it is important to...
Krista Lagus, Esa Alhoniemi, Harri Valpola
ICCV
2003
IEEE
14 years 10 months ago
Epitomic analysis of appearance and shape
See www.research.microsoft.com/jojic/epitome.htm for videos, comparisons and applications. We present novel simple appearance and shape models that we call epitomes. The epitome o...
Nebojsa Jojic, Brendan J. Frey, Anitha Kannan
JCS
2010
80views more  JCS 2010»
13 years 3 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...