Sciweavers

7978 search results - page 119 / 1596
» Combining shared-coin algorithms
Sort
View
140
Voted
ISCA
2011
IEEE
273views Hardware» more  ISCA 2011»
14 years 7 months ago
Bypass and insertion algorithms for exclusive last-level caches
Inclusive last-level caches (LLCs) waste precious silicon estate due to cross-level replication of cache blocks. As the industry moves toward cache hierarchies with larger inner l...
Jayesh Gaur, Mainak Chaudhuri, Sreenivas Subramone...
CORR
2006
Springer
98views Education» more  CORR 2006»
15 years 3 months ago
Recurrence relations and fast algorithms
We construct fast algorithms for evaluating transforms associated with families of functions which satisfy recurrence relations. These include algorithms both for computing the co...
Mark Tygert
133
Voted
ICASSP
2010
IEEE
14 years 10 months ago
Physical layer algorithm and hardware verification of MIMO relays using cooperative partial detection
Cooperative communication with multi-antenna relays can significantly increase the reliability and speed. However, cooperative MIMO detection would impose considerable complexity o...
Kiarash Amiri, Michael Wu, Melissa Duarte, Joseph ...
CVPR
2012
IEEE
13 years 5 months ago
RGB-(D) scene labeling: Features and algorithms
Scene labeling research has mostly focused on outdoor scenes, leaving the harder case of indoor scenes poorly understood. Microsoft Kinect dramatically changed the landscape, show...
Xiaofeng Ren, Liefeng Bo, Dieter Fox
138
Voted
ESE
2006
100views Database» more  ESE 2006»
15 years 3 months ago
An evaluation of combination strategies for test case selection
This paper presents results from a comparative evaluation of five combination strategies. Combination strategies are test case selection methods that combine "interesting&quo...
Mats Grindal, Birgitta Lindström, Jeff Offutt...