Sciweavers

3515 search results - page 35 / 703
» Resource usage analysis
Sort
View
ISSS
1998
IEEE
73views Hardware» more  ISSS 1998»
14 years 22 days ago
Resource Constrained Modulo Scheduling with Global Resource Sharing
Commonly used scheduling algorithms in high-level synthesis are not capable of sharing resources across process boundaries. This results in the usage of at least one resource per ...
Christoph Jäschke, Rainer Laur
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
14 years 2 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif
ICEB
2004
158views Business» more  ICEB 2004»
13 years 10 months ago
E-Business Adoption in Marketing and Its Relationship with Factors in SWOT Analysis: an Empirical Investigation of Small Softwar
This research gives empirically grounded insights into e-business adoption in conjunction with factors usually considered in SWOT (Strengths, Weaknesses, Opportunities, and Threat...
Edward Bernroider, Alexander Hampel
WIDM
2012
ACM
12 years 4 months ago
Replaying history on process models for conformance checking and performance analysis
Process mining techniques use event data to discover process models, to check the conformance of predefined process models, and to extend such models with information about bottl...
Wil M. P. van der Aalst, Arya Adriansyah, Boudewij...
ASPDAC
2004
ACM
97views Hardware» more  ASPDAC 2004»
14 years 1 months ago
Complexity analysis and speedup techniques for optimal buffer insertion with minimum cost
As gate delays decrease faster than wire delays for each technology generation, buffer insertion becomes a popular method to reduce the interconnect delay. Several modern buffer in...
Weiping Shi, Zhuo Li, Charles J. Alpert