Sciweavers

169 search results - page 3 / 34
» An extension of the generalized Hamiltonian method to S-para...
Sort
View
CASES
2005
ACM
13 years 7 months ago
Exploiting pipelining to relax register-file port constraints of instruction-set extensions
Customisable embedded processors are becoming available on the market, thus making it possible for designers to speed up execution of applications by using Application-specific F...
Laura Pozzi, Paolo Ienne
CASES
2007
ACM
13 years 9 months ago
Rethinking custom ISE identification: a new processor-agnostic method
The last decade has witnessed the emergence of the Application Specific Instruction-set Processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user...
Ajay K. Verma, Philip Brisk, Paolo Ienne
MOBIHOC
2009
ACM
14 years 6 months ago
Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods
Location-free boundary recognition is crucial and critical for many fundamental network functionalities in wireless ad hoc and sensor networks. Previous designs, often coarse-grai...
Dezun Dong, Yunhao Liu, Xiangke Liao
WWW
2007
ACM
14 years 6 months ago
Construction by linking: the linkbase method
The success of many innovative Web applications is not based on the content they produce ? but on how they combine and link existing content. Older Web Engineering methods lack fl...
Johannes Meinecke, Frederic Majer, Martin Gaedke
WWW
2004
ACM
14 years 6 months ago
A method for transparent admission control and request scheduling in e-commerce web sites
This paper presents a method for admission control and request scheduling for multiply-tiered e-commerce Web sites, achieving both stable behavior during overload and improved res...
Sameh Elnikety, Erich M. Nahum, John M. Tracey, Wi...