Sciweavers

1566 search results - page 159 / 314
» Contification Using Dominators
Sort
View
ICCD
2006
IEEE
312views Hardware» more  ICCD 2006»
15 years 7 months ago
A Design Approach for Fine-grained Run-Time Power Gating using Locally Extracted Sleep Signals
— Leakage power dissipation becomes a dominant component in operation power in nanometer devices. This paper describes a design methodology to implement runtime power gating in a...
Kimiyoshi Usami, Naoaki Ohkubo
AUSAI
2009
Springer
15 years 4 months ago
A Distance Metric for Evolutionary Many-Objective Optimization Algorithms Using User-Preferences
In this paper we propose to use a distance metric based on user-preferences to efficiently find solutions for many-objective problems. In a user-preference based algorithm a decis...
Upali K. Wickramasinghe, Xiaodong Li
WIMOB
2008
IEEE
15 years 4 months ago
Using LED Lighting for Ubiquitous Indoor Wireless Networking
—Wireless networking is currently dominated by radio frequency (RF) techniques. However, the soon-to-be ubiquity of LED-based lighting motivated by significant energy savings pro...
Thomas D. C. Little, Peter Dib, Kandarp Shah, Nick...
GLOBECOM
2007
IEEE
15 years 4 months ago
Efficient TCAM Encoding Schemes for Packet Classification Using Gray Code
—Packet classification is an enabling function in Internet routers for a variety of Internet applications. In order to classify Internet packets into flows, Internet routers must...
Yeim-Kuan Chang, Cheng-Chien Su
ICRA
2006
IEEE
60views Robotics» more  ICRA 2006»
15 years 4 months ago
Mechanism of Micro Manipulation using Oscillation
— In this paper, we analyze the mechanism of the phenomenon between an endeffector, a micro object and a substrate during a micro manipulation. In a micro range, the attracting f...
Tetsuyoh Watanabe, Zhongwei Jiang