Sciweavers

6960 search results - page 1271 / 1392
» Continuity Analysis of Programs
Sort
View
FPL
2007
Springer
99views Hardware» more  FPL 2007»
15 years 7 months ago
Disjoint Pattern Enumeration for Custom Instructions Identification
Extensible processors allow addition of application-specific custom instructions to the core instruction set architecture. These custom instructions are selected through an analys...
Pan Yu, Tulika Mitra
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 7 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
HIPEAC
2009
Springer
15 years 7 months ago
Deriving Efficient Data Movement from Decoupled Access/Execute Specifications
Abstract. On multi-core architectures with software-managed memories, effectively orchestrating data movement is essential to performance, but is tedious and error-prone. In this p...
Lee W. Howes, Anton Lokhmotov, Alastair F. Donalds...
IAT
2009
IEEE
15 years 7 months ago
Offline Planning for Communication by Exploiting Structured Interactions in Decentralized MDPs
Variants of the decentralized MDP model focus on problems exhibiting some special structure that makes them easier to solve in practice. Our work is concerned with two main issues...
Hala Mostafa, Victor R. Lesser
ASWEC
2004
IEEE
15 years 7 months ago
Teaching the Process of Code Review
Behavioural theory predicts that interventions that improving individual reviewers' expertise improves Software Development Technical Review group performance [3, p 6]. This ...
Tor Stålhane, Cat Kutay, Hiyam Al-Kilidar, D...
« Prev « First page 1271 / 1392 Last » Next »