• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 855
Next 10 →

Text Classification using String Kernels

by Huma Lodhi, Craig Saunders, John Shawe-Taylor, Nello Cristianini, Chris Watkins
"... We propose a novel approach for categorizing text documents based on the use of a special kernel. The kernel is an inner product in the feature space generated by all subsequences of length k. A subsequence is any ordered sequence of k characters occurring in the text though not necessarily contiguo ..."
Abstract - Cited by 495 (7 self) - Add to MetaCart
) show positive results on modestly sized datasets. The case of contiguous subsequences is also considered for comparison with the subsequences kernel with di erent decay factors. For larger documents and datasets the paper introduces an approximation technique that is shown to deliver good

Cache Decay: Exploiting Generational Behavior to Reduce Cache Leakage Power

by Stefanos Kaxiras, Zhigang Hu, Margaret Martonosi - in Proceedings of the 28th International Symposium on Computer Architecture , 2001
"... Power dissipation is increasingly important in CPUs ranging from those intended for mobile use, all the way up to highperformance processors for high-end servers. While the bulk of the power dissipated is dynamic switching power, leakage power is also beginning to be a concern. Chipmakers expect tha ..."
Abstract - Cited by 280 (26 self) - Add to MetaCart
. Because our decay-based techniques have notions of competitive on-line algorithms at their roots, their energy usage can be theoretically bounded at within a factor of two of the optimal oraclebased policy. We also examine adaptive decay-based policies that make energy-minimizing policy choices on a per

Using Coherence Information and Decay Techniques to Optimize L2 Cache Leakage

by In Cmps
"... Abstract—This paper evaluates several techniques to save leakage in CMP L2 caches by selectively switching off the less used lines. We primarily focus on private snoopy L2 caches. In this case, coherence must be enforced in all situations and specially when a line is turned off to save power. In par ..."
Abstract - Add to MetaCart
. In particular, we introduce three techniques: the first one turns off the cache lines by using the coherence protocol invalidations, the second one is an implementation of a cache decay technique specific for coherent caches, the third one is a performance-optimized decay-based technique for coherent caches

Using Coherence Information and Decay Techniques to Optimize L2 Cache Leakage in CMPs

by Matteo Monchiero, Ramon Canal
"... Abstract—This paper evaluates several techniques to save leakage in CMP L2 caches by selectively switching off the less used lines. We primarily focus on private snoopy L2 caches. In this case, coherence must be enforced in all situations and specially when a line is turned off to save power. In par ..."
Abstract - Add to MetaCart
. In particular, we introduce three techniques: the first one turns off the cache lines by using the coherence protocol invalidations, the second one is an implementation of a cache decay technique specific for coherent caches, the third one is a performance-optimized decay-based technique for coherent caches

Let Caches Decay: Reducing Leakage Energy via Exploitation of Cache Generational Behavior

by Zhigang Hu, Stefanos Kaxiras, Margaret Martonosi , 2002
"... This paper examines methods for reducing leakage power within the cache memories of the CPU. Because caches comprise much of a CPU chip's area and transistor counts, they are reasonable targets for attacking leakage. We discuss policies and implementations for reducing cache leakage by invalida ..."
Abstract - Cited by 31 (4 self) - Add to MetaCart
" before they are evicted. By devising eective, low-power ways of deducing dead time, our results show that in many cases we can reduce L1 cache leakage energy by 4x in SPEC2000 applications without impacting performance. Because our decay-based techniques have notions of competitive on-line algorithms

Probable networks and plausible predictions - - a review of practical Bayesian methods for supervised neural networks

by David J C MacKay , 1995
"... Bayesian probabilily theory provides a unifying framework for dara modelling. In this framework the overall aims are to find models that are well-matched to, the &a, and to use &se models to make optimal predictions. Neural network laming is interpreted as an inference of the most probable ..."
Abstract - Cited by 178 (6 self) - Add to MetaCart
the data. This review describes practical techniques based on Gaussian approximations for implementation of these powerful methods for controlling, comparing and using adaptive networks.

Profile-based adaptation for cache decay

by Karthik Sankaranarayanan - ACM Trans. Archit. Code Optim , 2004
"... Cache decay is a leakage-reduction mechanism that puts cache lines that have not been accessed for a specific duration into a lowleakage standby mode. This duration is called the decay interval, and its optimal value varies across applications. This paper describes an adaptation technique that analy ..."
Abstract - Cited by 7 (3 self) - Add to MetaCart
Cache decay is a leakage-reduction mechanism that puts cache lines that have not been accessed for a specific duration into a lowleakage standby mode. This duration is called the decay interval, and its optimal value varies across applications. This paper describes an adaptation technique

Image Based Flow Visualization

by Jarke J. van Wijk , 2002
"... A new method for the visualization of two-dimensional fluid flow is presented. The method is based on the advection and decay of dye. These processes are simulated by defining each frame of a flow animation as a blend between a warped version of the previous image and a number of background images. ..."
Abstract - Cited by 133 (3 self) - Add to MetaCart
A new method for the visualization of two-dimensional fluid flow is presented. The method is based on the advection and decay of dye. These processes are simulated by defining each frame of a flow animation as a blend between a warped version of the previous image and a number of background images

Language Model Adaptation Using Mixtures And An Exponentially Decaying Cache

by P.R. Clarkson, A. J. Robinson - In Proceedings of ICASSP-97 , 1997
"... This paper presents two techniques for language model adaptation. The first is based on the use of mixtures of language models: the training text is partitioned according to topic, a language model is constructed for each component, and at recognition time appropriate weightings are assigned to each ..."
Abstract - Cited by 107 (4 self) - Add to MetaCart
to each component to model the observed style of language. The second technique is based on augmenting the standard trigram model with a cache component in which words recurrence probabilities decay exponentially over time. Both techniques yield a significant reduction in perplexity over the baseline

Blind estimation of reverberation time based on the distribution of signal decay rates

by Jimi Y. C. Wen, Emanuël A. P. Habets, Patrick A. Naylor - in Proc. IEEE Intl. Conf. on Acoustics, Speech and Signal Processing (ICASSP , 2008
"... The reverberation time is one of the most prominent acoustic characteristics of an enclosure. Its value can be used to predict speech intelligibility, and is used by speech enhancement techniques to suppress reverberation. The reverberation time is usually obtained by analysing the decay rate of i) ..."
Abstract - Cited by 12 (4 self) - Add to MetaCart
The reverberation time is one of the most prominent acoustic characteristics of an enclosure. Its value can be used to predict speech intelligibility, and is used by speech enhancement techniques to suppress reverberation. The reverberation time is usually obtained by analysing the decay rate of i
Next 10 →
Results 1 - 10 of 855
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University