Sciweavers

26496 search results - page 5187 / 5300
» An Approach to Computing Ethics
Sort
View
CPM
2000
Springer
177views Combinatorics» more  CPM 2000»
15 years 2 months ago
Identifying and Filtering Near-Duplicate Documents
Abstract. The mathematical concept of document resemblance captures well the informal notion of syntactic similarity. The resemblance can be estimated using a fixed size “sketch...
Andrei Z. Broder
PLDI
1999
ACM
15 years 2 months ago
Load-Reuse Analysis: Design and Evaluation
Load-reuse analysis finds instructions that repeatedly access the same memory location. This location can be promoted to a register, eliminating redundant loads by reusing the re...
Rastislav Bodík, Rajiv Gupta, Mary Lou Soff...
EH
1999
IEEE
214views Hardware» more  EH 1999»
15 years 2 months ago
Coevolutionary Robotics
We address the fundamental issue of fully automated design (FAD) and construction of inexpensive robots and their controllers. Rather than seek an intelligent general purpose robo...
Jordan B. Pollack, Hod Lipson, Pablo Funes, Sevan ...
SMA
1999
ACM
100views Solid Modeling» more  SMA 1999»
15 years 2 months ago
Matchmaker: manifold BReps for non-manifold r-sets
Many solid modeling construction techniques produce non-manifold r-sets (solids). With each non-manifold model N we can associate a family of manifold solid models that are infini...
Jarek Rossignac, David E. Cardoze
ICCAD
1999
IEEE
92views Hardware» more  ICCAD 1999»
15 years 2 months ago
Interface and cache power exploration for core-based embedded system design
Minimizing power consumption is of paramount importance during the design of embedded (mobile computing) systems that come as systems-ona-chip, since interdependencies of design c...
Tony Givargis, Jörg Henkel, Frank Vahid
« Prev « First page 5187 / 5300 Last » Next »