Sciweavers

898 search results - page 146 / 180
» An Analysis of Permutations in Arrays
Sort
View
IROS
2009
IEEE
121views Robotics» more  IROS 2009»
15 years 6 months ago
Microparticle manipulation using multiple untethered magnetic micro-robots on an electrostatic surface
Abstract— This work presents the control of multiple untethered rectilinear magnetic micro-robots (Mag-µBots) with dimensions 250 × 130 × 100 µm3 actuated by pulsed external ...
Steven Floyd, Chytra Pawashe, Metin Sitti
ESA
2009
Springer
149views Algorithms» more  ESA 2009»
15 years 6 months ago
3.5-Way Cuckoo Hashing for the Price of 2-and-a-Bit
The study of hashing is closely related to the analysis of balls and bins; items are hashed to memory locations much as balls are thrown into bins. In particular, Azar et. al. [2] ...
Eric Lehman, Rina Panigrahy
ISLPED
2009
ACM
110views Hardware» more  ISLPED 2009»
15 years 6 months ago
SOI, interconnect, package, and mainboard thermal characterization
This paper presents an evaluation to determine the importance of the accurate thermal characterization for several elements of a semiconductor device. Specifically, it evaluates ...
Joseph Nayfach-Battilana, Jose Renau
ICASSP
2008
IEEE
15 years 6 months ago
Sigma-delta resolution enhancement for far-field acoustic source separation
Many source separation algorithms fail to deliver robust performance when applied to signals recorded using highdensity microphone arrays where distance between sensor elements is...
Amin Fazel, Shantanu Chakrabartty
IEEEPACT
2008
IEEE
15 years 6 months ago
Exploiting loop-dependent stream reuse for stream processors
The memory access limits the performance of stream processors. By exploiting the reuse of data held in the Stream Register File (SRF), an on-chip storage, the number of memory acc...
Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers,...