Results 1 - 10
of
8,444
The SimpleScalar tool set, version 2.0
- Computer Architecture News
, 1997
"... This report describes release 2.0 of the SimpleScalar tool set, a suite of free, publicly available simulation tools that offer both detailed and high-performance simulation of modern microprocessors. The new release offers more tools and capabilities, precompiled binaries, cleaner interfaces, bette ..."
Abstract
-
Cited by 1844 (43 self)
- Add to MetaCart
, better documentation, easier installation, improved portability, and higher performance. This report contains a complete description of the tool set, including retrieval and installation instructions, a description of how to use the tools, a description of the target SimpleScalar architecture, and many
Some studies in machine learning using the game of Checkers
- IBM JOURNAL OF RESEARCH AND DEVELOPMENT
, 1959
"... Two machine-learning procedures have been investigated in some detail using the game of checkers. Enough work has been done to verify the fact that a computer can be programmed so that it will learn to play a better game of checkers than can be played by the person who wrote the program. Furthermor ..."
Abstract
-
Cited by 780 (0 self)
- Add to MetaCart
. Furthermore, it can learn to do this in a remarkably short period of time (8 or 10 hours of machine-playing time) when given only the rules of the game, a sense of direction, and a redundant and incomplete list of parameters which are thought to have something to do with the game, but whose correct signs
Wide-Area Traffic: The Failure of Poisson Modeling
- IEEE/ACM TRANSACTIONS ON NETWORKING
, 1995
"... Network arrivals are often modeled as Poisson processes for analytic simplicity, even though a number of traffic studies have shown that packet interarrivals are not exponentially distributed. We evaluate 24 wide-area traces, investigating a number of wide-area TCP arrival processes (session and con ..."
Abstract
-
Cited by 1775 (24 self)
- Add to MetaCart
with fixed hourly rates, but that other connection arrivals deviate considerably from Poisson; that modeling TELNET packet interarrivals as exponential grievously underestimates the burstiness of TELNET traffic, but using the empirical Tcplib [Danzig et al, 1992] interarrivals preserves burstiness over many
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
- In Network and Distributed Systems Security Symposium
, 2005
"... Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or even minutes, and cause millions of dollars of damage [32, 51]. To successfully combat these fast automatic Internet attacks, we nee ..."
Abstract
-
Cited by 647 (32 self)
- Add to MetaCart
Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or even minutes, and cause millions of dollars of damage [32, 51]. To successfully combat these fast automatic Internet attacks, we
The Future of Personnel Economics
- IZA EUROPEAN SUMMER SYMPOSIUM IN LABOUR ECONOMICS
, 1999
"... Personnel economics has grown over the past twenty years to become a major branch of labor economics. Beginning primarily as a theoretical field, recent empirical analyses have provided support for earlier theories. Personnel economics is distinguished from traditional personnel analysis in that it ..."
Abstract
-
Cited by 246 (6 self)
- Add to MetaCart
in that it is economics. As such, personnel economists assume maximizing agents, invoke the concept of equilibrium, and focus on economic efficiency. Although much has been learned, many important questions remain. For example, are worker wage profiles dependent on individual attributes or is the firm more important
A Measurement Study of Vehicular Internet Access Using
- In Situ Wi-Fi Networks. In 12th ACM MOBICOM Conf
, 2006
"... The impressive penetration of 802.11-based wireless networks in many metropolitan areas around the world offers, for the first time, the opportunity of a “grassroots ” wireless Internet service provided by users who “open up ” their 802.11 (Wi-Fi) access points in a controlled manner to mobile clien ..."
Abstract
-
Cited by 197 (6 self)
- Add to MetaCart
The impressive penetration of 802.11-based wireless networks in many metropolitan areas around the world offers, for the first time, the opportunity of a “grassroots ” wireless Internet service provided by users who “open up ” their 802.11 (Wi-Fi) access points in a controlled manner to mobile
Mariposa: A Wide-Area Distributed Database System
- VLDB Journal
, 1996
"... Abstract. The requirements of wide-area distributed database systems differ dramatically from those of local-area network systems. In a wide-area network (WAN) configuration, individual sites usually report to different system administrators, have different access and charging algorithms, install si ..."
Abstract
-
Cited by 198 (8 self)
- Add to MetaCart
site-specific data type extensions, and have different constraints on servicing remote requests. Typical of the last point are production transaction environments, which are fully engaged during normal business hours, and cannot take on additional load. Finally, there may be many sites participating
Behavioral theories and the neurophysiology of reward,
- Annu. Rev. Psychol.
, 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract
-
Cited by 187 (0 self)
- Add to MetaCart
of the infrastructure over a 24-hour day, by avoiding long queues during prime daytime hours and inactive periods during the wee hours of the night. A proper pricing structure known in advance to the captains of the barges will shape their decisions to enter the locks at a moment that is economically most appropriate
Corrective feedback and learner uptake: Negotiation of form in communicative classroom.
- Studies in Second Language Acquisition,
, 1997
"... This article presents a study of corrective feedback and learner uptake (i.e., responses to feedback) in four immersion classrooms at the primary level. Transcripts totaling 18.3 hours of classroom interaction taken from 14 subject-matter lessons and 13 French language arts lessons were analyzed us ..."
Abstract
-
Cited by 173 (6 self)
- Add to MetaCart
This article presents a study of corrective feedback and learner uptake (i.e., responses to feedback) in four immersion classrooms at the primary level. Transcripts totaling 18.3 hours of classroom interaction taken from 14 subject-matter lessons and 13 French language arts lessons were analyzed
Knowledge-based Training of Artificial Neural Networks for Autonomous Robot Driving
, 1993
"... Many real world problems quirea degree of flexibility that is to achieve using hand algorithms. One such domain is vision-based autonomous driving. In this task, the dual challenges of a constantly changing environment coupled with a real processing constrain the flexibility and of a machine le ..."
Abstract
-
Cited by 162 (13 self)
- Add to MetaCart
Many real world problems quirea degree of flexibility that is to achieve using hand algorithms. One such domain is vision-based autonomous driving. In this task, the dual challenges of a constantly changing environment coupled with a real processing constrain the flexibility and of a machine
Results 1 - 10
of
8,444