Sciweavers

225 search results - page 33 / 45
» Retargetable binary utilities
Sort
View
ICPR
2008
IEEE
14 years 2 months ago
Imaging biomarker analysis of rat mammary fat pads and glandular tissues in MRI images
In studying the relationship between risk factors and breast cancer, the growth patterns of fat pads and glandular tissues are considered as important biomarkers. The aim of this ...
Yimo Tao, Jianhua Xuan, Matthew T. Freedman, Glori...
RAID
2007
Springer
14 years 1 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
IJCNN
2006
IEEE
14 years 1 months ago
Particle Swarm Optimization based Defensive Islanding of Large Scale Power System
— Defensive islanding is an efficient way to avoid catastrophic failures and wide area blackouts. Power system splitting especially for large scale power systems is a combinatori...
Wenxin Liu, David A. Cartes, Ganesh K. Venayagamoo...
IPPS
2006
IEEE
14 years 1 months ago
Automatic application-specific microarchitecture reconfiguration
Applications for constrained embedded systems are subject to strict time constraints and restrictive resource utilization. With soft core processors, application developers can cu...
Shobana Padmanabhan, Ron K. Cytron, Roger D. Chamb...
ACMMSP
2005
ACM
99views Hardware» more  ACMMSP 2005»
14 years 1 months ago
Gated memory control for memory monitoring, leak detection and garbage collection
ct In the past, program monitoring often operates at the code level, performing checks at function and loop boundaries. Recent research shows that profiling analysis can identify ...
Chen Ding, Chengliang Zhang, Xipeng Shen, Mitsunor...