Sciweavers

53 search results - page 8 / 11
» Selective, accurate, and timely self-invalidation using last...
Sort
View
MICRO
2007
IEEE
135views Hardware» more  MICRO 2007»
14 years 2 months ago
Microarchitectural Design Space Exploration Using an Architecture-Centric Approach
The microarchitectural design space of a new processor is too large for an architect to evaluate in its entirety. Even with the use of statistical simulation, evaluation of a sing...
Christophe Dubach, Timothy M. Jones, Michael F. P....
IJCAI
1989
13 years 9 months ago
Input Data Management in Real-Time AI Systems
A real-time AI system in the real world needs to monitor an immense volume of data. To do this, the system must filter out much of the incoming data. However, it must remain re­ ...
Richard Washington, Barbara Hayes-Roth
CCGRID
2009
IEEE
14 years 2 months ago
Modeling Job Lifespan Delays in Volunteer Computing Projects
Volunteer Computing (VC) projects harness the power of computers owned by volunteers across the Internet to perform hundreds of thousands of independent jobs. In VC projects, the ...
Trilce Estrada, Michela Taufer, Kevin Reed
FOGA
2011
12 years 11 months ago
Approximating the distribution of fitness over hamming regions
The distribution of fitness values across a set of states sharply influences the dynamics of evolutionary processes and heuristic search in combinatorial optimization. In this p...
Andrew M. Sutton, Darrell Whitley, Adele E. Howe
CHI
2005
ACM
14 years 8 months ago
The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation area
We present the bubble cursor ? a new target acquisition technique based on area cursors. The bubble cursor improves upon area cursors by dynamically resizing its activation area d...
Tovi Grossman, Ravin Balakrishnan