Sciweavers

943 search results - page 147 / 189
» Simulation based deadlock analysis for system level designs
Sort
View
DMIN
2009
180views Data Mining» more  DMIN 2009»
13 years 6 months ago
APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...
ISPD
2006
ACM
126views Hardware» more  ISPD 2006»
14 years 2 months ago
Noise driven in-package decoupling capacitor optimization for power integrity
The existing decoupling capacitance optimization approaches meet constraints on input impedance for package. In this paper, we show that using impedance as constraints leads to la...
Jun Chen, Lei He
PPDP
2000
Springer
14 years 12 days ago
Declarative event-oriented programming
Events play an important role in the construction of most software that involves interaction or simulation. Typically, programmers make use of a fixed set of low level events supp...
Conal Elliott
JSSPP
2004
Springer
14 years 2 months ago
Reconfigurable Gang Scheduling Algorithm
 Using a single traditional gang scheduling algorithm cannot provide the best performance for all workloads and parallel architectures. A solution for this problem is the use of...
Luís Fabrício Wanderley Góes,...
DT
2000
88views more  DT 2000»
13 years 8 months ago
Postsilicon Validation Methodology for Microprocessors
f abstraction as applicable to break the problem's complexity, and innovating better techniques to address complexity of new microarchitectural features. Validation techniques...
Hemant G. Rotithor