Sciweavers

10602 search results - page 126 / 2121
» Weakly Useful Sequences
Sort
View
JCP
2006
173views more  JCP 2006»
13 years 9 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar
ISBI
2008
IEEE
14 years 10 months ago
Tracking of cells in a sequence of images using a low-dimension image representation
We propose a new image analysis method to segment and track cells in a growing colony. By using an intermediate low-dimension image representation yielded by a reliable over-segme...
Alice Demarez, Ariel B. Lindner, François T...
ICPP
2002
IEEE
14 years 2 months ago
Out-of-Order Instruction Fetch Using Multiple Sequencers
Conventional instruction fetch mechanisms fetch contiguous blocks of instructions in each cycle. They are difficult to scale since taken branches make it hard to increase the siz...
Paramjit S. Oberoi, Gurindar S. Sohi
ADAEUROPE
2010
Springer
13 years 7 months ago
Towards the Definition of a Pattern Sequence for Real-Time Applications Using a Model-Driven Engineering Approach
Real-Time (RT) systems exhibit specific characteristics that make them particularly sensitive to architectural decissions. Design patterns help integrating the desired timing behav...
Juan A. Pastor, Diego Alonso, Pedro Sánchez...
VTS
2002
IEEE
108views Hardware» more  VTS 2002»
14 years 2 months ago
On Using Efficient Test Sequences for BIST
High defect coverage requires good coverage of different fault types. In this paper, we present a comprehensive test vector generation technique for BIST, called Random Single Inp...
René David, Patrick Girard, Christian Landr...