Sciweavers

1566 search results - page 89 / 314
» Contification Using Dominators
Sort
View
ISLPED
1997
ACM
95views Hardware» more  ISLPED 1997»
15 years 2 months ago
Formalized methodology for data reuse exploration in hierarchical memory mappings
Efficient use of an optimized memory hierarchy to exploit temporal locality in the memory accesses on array signals can have a very large impact on the power consumption in data ...
Jean-Philippe Diguet, Sven Wuytack, Francky Cattho...
IPPS
1996
IEEE
15 years 2 months ago
A New Approach to Pipeline FFT Processor
A new VLSI architecture for real-time pipeline FFT processor is proposed. A hardware oriented radix-22 algorithm is derived by integrating a twiddle factor decomposition technique ...
Shousheng He, Mats Torkelson
VR
1993
IEEE
120views Virtual Reality» more  VR 1993»
15 years 1 months ago
Presence in Immersive Virtual Environments
This paper describes an experiment where the effect of dynamic shadows in an immersive virtual environment is measured with respect to spatial perception and presence. Eight subjec...
Mel Slater, Martin Usoh
AUTONOMICS
2007
ACM
15 years 1 months ago
End-to-end vs. hop-by-hop transport under intermittent connectivity
This paper revisits the fundamental trade-off between endto-end and hop-by-hop transport control. The end-to-end principle has been one of the building blocks of the Internet; but...
Simon Heimlicher, Merkourios Karaliopoulos, Hanoch...
CAISE
2007
Springer
15 years 1 months ago
Deciding to Adopt Requirements Traceability in Practice
The use of requirements traceability for information systems development (ISD) projects is not very common in practice despite its often mentioned advantages in the literature. We ...
Floris Blaauboer, Klaas Sikkel, Mehmet N. Aydin