Sciweavers

980 search results - page 94 / 196
» The Architecture Tradeoff Analysis Method
Sort
View
LCTRTS
2010
Springer
14 years 20 days ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
ICCAD
1996
IEEE
95views Hardware» more  ICCAD 1996»
14 years 1 days ago
Semi-analytical techniques for substrate characterization in the design of mixed-signal ICs
A number of methods are presentedfor highly efficient calculation of substratecurrenttransport. A three-dimensionalGreen'sFunction based substrate representation, in combinat...
Edoardo Charbon, Ranjit Gharpurey, Alberto L. Sang...
IDA
1999
Springer
14 years 5 days ago
Knowledge-Based Visualization to Support Spatial Data Mining
Data mining methods are designed for revealing significant relationships and regularities in data collections. Regarding spatially referenced data, analysis by means of data minin...
Gennady L. Andrienko, Natalia V. Andrienko
ICIAP
2005
ACM
14 years 8 months ago
Robust Face Recognition Based on Part-Based Localized Basis Images
In order for a subspace projection based method to be robust to local distortion and partial occlusion, the basis images generated by the method should exhibit a part-based local r...
Jongsun Kim, Juneho Yi
DEXA
2005
Springer
148views Database» more  DEXA 2005»
14 years 1 months ago
XG: A Data-Driven Computation Grid for Enterprise-Scale Mining
In this paper we introduce a novel architecture for data processing, based on a functional fusion between a data and a computation layer. We show how such an architecture can be le...
Radu Sion, Ramesh Natarajan, Inderpal Narang, Wen-...