Sciweavers

4764 search results - page 528 / 953
» Applications of Error-Control Coding
Sort
View
CODES
2004
IEEE
15 years 8 months ago
Operation tables for scheduling in the presence of incomplete bypassing
Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing ha...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...
OSDI
1996
ACM
15 years 5 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
BMCBI
2010
138views more  BMCBI 2010»
15 years 4 months ago
A model-independent approach to infer hierarchical codon substitution dynamics
Background: Codon substitution constitutes a fundamental process in molecular biology that has been studied extensively. However, prior studies rely on various assumptions, e.g. r...
Olof Görnerup, Martin Nilsson Jacobi
CC
2008
Springer
133views System Software» more  CC 2008»
15 years 4 months ago
Hardness Amplification via Space-Efficient Direct Products
We prove a version of the derandomized Direct Product lemma for deterministic space-bounded algorithms. Suppose a Boolean function g : {0, 1}n {0, 1} cannot be computed on more th...
Venkatesan Guruswami, Valentine Kabanets
JSAC
2008
106views more  JSAC 2008»
15 years 4 months ago
A Low-Complexity Detector for Large MIMO Systems and Multicarrier CDMA Systems
We consider large MIMO systems, where by `large' we mean number of transmit and receive antennas of the order of tens to hundreds. Such large MIMO systems will be of immense i...
K. Vishnu Vardhan, Saif K. Mohammed, Ananthanaraya...