Sciweavers

3389 search results - page 576 / 678
» Real-Time and Fault-Tolerant Systems
Sort
View
ICDE
2012
IEEE
239views Database» more  ICDE 2012»
11 years 11 months ago
Provenance-based Indexing Support in Micro-blog Platforms
Abstract— Recently, lots of micro-blog message sharing applications have emerged on the web. Users can publish short messages freely and get notified by the subscriptions instan...
Junjie Yao, Bin Cui, Zijun Xue, Qingyun Liu
ICCD
2004
IEEE
112views Hardware» more  ICCD 2004»
14 years 6 months ago
Reducing Issue Queue Power for Multimedia Applications using a Feedback Control Algorithm
In this work, we propose a dynamic power-aware issue queue in a general-purpose microprocessor for multimedia applications. Its resources can be adapted at runtime in accordance w...
Yu Bai, R. Iris Bahar
RTCSA
2009
IEEE
14 years 3 months ago
Branch Target Buffers: WCET Analysis Framework and Timing Predictability
—One step in the verification of hard real-time systems is to determine upper bounds on the worst-case execution times (WCET) of tasks. To obtain tight bounds, a WCET analysis h...
Daniel Grund, Jan Reineke, Gernot Gebhard
ISNN
2009
Springer
14 years 3 months ago
Research on Segment Acoustic Model Based Mandarin LVCSR
SM has shown a better performance than HMM in connected word recognition system; however, no reports we have read show that SM has been applied in LVCSR as decoding acoustic model ...
Wenju Liu, Yun Tang, Shouye Peng
ICPR
2008
IEEE
14 years 3 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi