Sciweavers

1566 search results - page 159 / 314
» Contification Using Dominators
Sort
View
ICCD
2006
IEEE
312views Hardware» more  ICCD 2006»
16 years 2 months ago
A Design Approach for Fine-grained Run-Time Power Gating using Locally Extracted Sleep Signals
— Leakage power dissipation becomes a dominant component in operation power in nanometer devices. This paper describes a design methodology to implement runtime power gating in a...
Kimiyoshi Usami, Naoaki Ohkubo
AUSAI
2009
Springer
15 years 11 months ago
A Distance Metric for Evolutionary Many-Objective Optimization Algorithms Using User-Preferences
In this paper we propose to use a distance metric based on user-preferences to efficiently find solutions for many-objective problems. In a user-preference based algorithm a decis...
Upali K. Wickramasinghe, Xiaodong Li
WIMOB
2008
IEEE
15 years 11 months ago
Using LED Lighting for Ubiquitous Indoor Wireless Networking
—Wireless networking is currently dominated by radio frequency (RF) techniques. However, the soon-to-be ubiquity of LED-based lighting motivated by significant energy savings pro...
Thomas D. C. Little, Peter Dib, Kandarp Shah, Nick...
GLOBECOM
2007
IEEE
15 years 11 months ago
Efficient TCAM Encoding Schemes for Packet Classification Using Gray Code
—Packet classification is an enabling function in Internet routers for a variety of Internet applications. In order to classify Internet packets into flows, Internet routers must...
Yeim-Kuan Chang, Cheng-Chien Su
127
Voted
ICRA
2006
IEEE
60views Robotics» more  ICRA 2006»
15 years 11 months ago
Mechanism of Micro Manipulation using Oscillation
— In this paper, we analyze the mechanism of the phenomenon between an endeffector, a micro object and a substrate during a micro manipulation. In a micro range, the attracting f...
Tetsuyoh Watanabe, Zhongwei Jiang