• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 819
Next 10 →

Networks of Spiking Neurons: The Third Generation of Neural Network Models

by Wolfgang Maass , 1996
"... The computational power of formal models for networks of spiking neurons is compared with that of other neural network models based on McCulloch Pitts neurons (i.e. threshold gates) respectively sigmoidal gates. In particular it is shown that networks of spiking neurons are computationally more powe ..."
Abstract - Cited by 192 (14 self) - Add to MetaCart
The computational power of formal models for networks of spiking neurons is compared with that of other neural network models based on McCulloch Pitts neurons (i.e. threshold gates) respectively sigmoidal gates. In particular it is shown that networks of spiking neurons are computationally more

Open MPI: Goals, concept, and design of a next generation MPI implementation

by Edgar Gabriel, Graham E. Fagg, George Bosilca, Thara Angskun, Jack J. Dongarra, Jeffrey M. Squyres, Vishal Sahay, Prabhanjan Kambadur, Brian Barrett, Andrew Lumsdaine, Ralph H. Castain, David J. Daniel, Richard L. Graham, Timothy S. Woodall - In Proceedings, 11th European PVM/MPI Users’ Group Meeting , 2004
"... Abstract. A large number of MPI implementations are currently available, each of which emphasize different aspects of high-performance computing or are intended to solve a specific research problem. The result is a myriad of incompatible MPI implementations, all of which require separate installatio ..."
Abstract - Cited by 223 (53 self) - Add to MetaCart
that is fundamentally centered around component concepts. Open MPI provides a unique combination of novel features previously unavailable in an open-source, production-quality implementation of MPI. Its component architecture provides both a stable platform for third-party research as well as enabling the run

Formal virtualization requirements for the ARM architecture

by Niels Pennemana, Danielius Kudinskasc, Alasdair Rawsthornec, Bjorn De Suttera, Koen De Bosscherea
"... We present an analysis of the virtualizability of the ARMv7-A architecture carried out in the context of the seminal paper published by Popek and Goldberg 38 years ago. Because their definitions are dated, we first extend their machine model to modern architectures with paged virtual memory, IO and ..."
Abstract - Add to MetaCart
We present an analysis of the virtualizability of the ARMv7-A architecture carried out in the context of the seminal paper published by Popek and Goldberg 38 years ago. Because their definitions are dated, we first extend their machine model to modern architectures with paged virtual memory, IO

UCAN: A Unified Cellular and Ad-Hoc Network Architecture

by Haiyun Luo, Ramachandran Ramjee, Ran Ramjee, Prasun Sinha, Li (Erran) Li, Songwu Lu - In Proceedings of ACM MOBICOM , 2003
"... In third-generation (3G) wireless data networks, mobile users experiencing poor channel quality usually have low data-rate connections with the base-station. Providing service to low data-rate users is required for maintaining fairness, but at the cost of reducing the cell's aggregate throughp ..."
Abstract - Cited by 164 (7 self) - Add to MetaCart
In third-generation (3G) wireless data networks, mobile users experiencing poor channel quality usually have low data-rate connections with the base-station. Providing service to low data-rate users is required for maintaining fairness, but at the cost of reducing the cell's aggregate

Coil sensitivity encoding for fast MRI. In:

by Klaas P Pruessmann , Markus Weiger , Markus B Scheidegger , Peter Boesiger - Proceedings of the ISMRM 6th Annual Meeting, , 1998
"... New theoretical and practical concepts are presented for considerably enhancing the performance of magnetic resonance imaging (MRI) by means of arrays of multiple receiver coils. Sensitivity encoding (SENSE) is based on the fact that receiver sensitivity generally has an encoding effect complementa ..."
Abstract - Cited by 193 (3 self) - Add to MetaCart
-coil array in brain imaging. With an array of five coils double-oblique heart images were obtained in one-third of conventional scan time. Magn Reson Med 42:952-962, 1999. 1999 Wiley-Liss, Inc. Key words: MRI; sensitivity encoding; SENSE; fast imaging; receiver coil array Among today's many medical

Generating Summaries of Multiple News Articles

by Kathleen Mckeown, Dragomir R. Radev - In Proceedings, 18th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval , 1995
"... So That Nobody Has To Go To School If They Don't Want To by Roger Sipher A decline in standardized test scores is but the most recent indicator that American education is in trouble. One reason for the crisis is that present mandatory-attendance laws force many to attend school who have no wish ..."
Abstract - Cited by 141 (12 self) - Add to MetaCart
mission of the institution. Has not the noble experiment of a formal education for everyone failed? While we pay homage to the homily, "You can lead a horse to water but you can't make him drink," we have pretended it is not true in education. Ask high school teachers if recalcitrant

Model-integrated development of embedded software

by Gabor Karsai, Janos Sztipanovits, Akos Ledeczi, Ted Bapty - Proceedings of the IEEE , 2003
"... Proceedings of the IEEE January 2003 The paper describes a model-integrated approach for embedded software development that is based on domain-specific, multiple view models used in all phases of the development process. Models explicitly represent the embedded software and the environment it operat ..."
Abstract - Cited by 164 (33 self) - Add to MetaCart
it operates in, and capture the requirements and the design of the application, simultaneously. Models are descriptive, in the sense that they allow the formal analysis, verification and validation of the embedded system at design time. Models are also generative, in the sense that they carry enough

Model Driven Security: from UML Models to Access Control Infrastructures

by David Basin, Jürgen Doser, Torsten Lodderstedt - ACM Transactions on Software Engineering and Methodology , 2006
"... We present a new approach to building secure systems. In our approach, which we call Model Driven Security, designers specify system models along with their security requirements and use tools to automatically generate system architectures from the models including complete, configured access contro ..."
Abstract - Cited by 147 (14 self) - Add to MetaCart
We present a new approach to building secure systems. In our approach, which we call Model Driven Security, designers specify system models along with their security requirements and use tools to automatically generate system architectures from the models including complete, configured access

Declarative Networking: Language, Execution and Optimization

by Boon Thau Loo, Tyson Condie, Minos Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica , 2006
"... The networking and distributed systems communities have recently explored a variety of new network architectures, both for applicationlevel overlay networks, and as prototypes for a next-generation Internet architecture. In this context, we have investigated declarative networking: the use of a dis ..."
Abstract - Cited by 120 (29 self) - Add to MetaCart
The networking and distributed systems communities have recently explored a variety of new network architectures, both for applicationlevel overlay networks, and as prototypes for a next-generation Internet architecture. In this context, we have investigated declarative networking: the use of a

Point-to-point connectivity between neuromorphic chips using address-events

by Kwabena A. Boahen - IEEE Trans. Circuits Syst. II , 2000
"... Abstract — I discuss connectivity between neuromorphic chips, which use the timing of fixed-height, fixed-width, pulses to encode information. Address-events—log2 (N)-bit packets that uniquely identify one of N neurons—are used to transmit these pulses in real-time on a random-access, time-multiplex ..."
Abstract - Cited by 128 (19 self) - Add to MetaCart
the arbitered channel with a formal design methodology for asynchronous digital VLSI CMOS systems, after introducing the reader to this top-down synthesis technique. Following the evolution of three generations of designs, I show how the overhead of arbitrating, and encoding and decoding, can be reduced in area
Next 10 →
Results 1 - 10 of 819
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University