2015
DOI: 10.1007/s11036-015-0587-2
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Time-slice Scaling for Addressing OS Problems Incurred by Main Memory DVFS in Intelligent System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…Algorithm PPV NPV F Hui [11] 0.64 0.81 0.715 Zhang [32] 0.83 0.74 0.782 Yousef [12] 0.86 0.89 0.875 Song [41] 0.95 0.93 0.94 Our 0.88 0.99 0.93 final nucleus segmentation results of our method for synthetic datasets and EDF images.…”
Section: Discussionmentioning
confidence: 94%
See 2 more Smart Citations
“…Algorithm PPV NPV F Hui [11] 0.64 0.81 0.715 Zhang [32] 0.83 0.74 0.782 Yousef [12] 0.86 0.89 0.875 Song [41] 0.95 0.93 0.94 Our 0.88 0.99 0.93 final nucleus segmentation results of our method for synthetic datasets and EDF images.…”
Section: Discussionmentioning
confidence: 94%
“…Based on the EDF images from the testing dataset of ISBI2015, the algorithm in this paper is compared with the methods proposed by Hui [11], Zhang [32], Yousef [12], Song [41], respectively, on the three measurement methods of PPV, NPV, and F ( Table 5). From Table 5, the nucleus segmentation method described in this paper shows excellent performance under these three metrics, and its performance is generally higher than the first four methods.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…As the technology is growing day by day, the inventions of new technologies and their applications had been growing day to day and increasing in number from time to time. Several new technologies had been evolving day to day, the new security threats and new security trends have been developing day by day [7][8] [9]. Providing security to the devices with these sorts of new trends are making a new and big challenges from time to time to protect the networks and its components from the ever increasing cyber attacks and cyber threats [10].…”
Section: Various Modes Of Cyber Security Attacksmentioning
confidence: 99%
“…The users will be given unique identification and codes for their identification in the network. Checking of the users from time to time to monitor the utilization of the customers who were not registered with the company, also to monitor the access by providing the passwords to the users with which they cannot be breached by any others and also these passwords cannot be done or noted by any other outside person from outside the network [16]. The passwords should always be more complex and very difficult to estimate them.…”
Section: Logical Access Controlsmentioning
confidence: 99%