Sciweavers

5675 search results - page 1072 / 1135
» Exploiting Chaos for Computation
Sort
View
126
Voted
IESS
2007
Springer
165views Hardware» more  IESS 2007»
15 years 7 months ago
Data Reuse Driven Memory and Network-On-Chip Co-Synthesis
NoCs present a possible communication infrastructure solution to deal with increased design complexity and shrinking time-to-market. The communication infrastructure is a signific...
Ilya Issenin, Nikil Dutt
97
Voted
IPSN
2007
Springer
15 years 7 months ago
The worst-case capacity of wireless sensor networks
The key application scenario of wireless sensor networks is data gathering: sensor nodes transmit data, possibly in a multi-hop fashion, to an information sink. The performance of...
Thomas Moscibroda
KDD
2007
ACM
179views Data Mining» more  KDD 2007»
15 years 7 months ago
Mining statistically important equivalence classes and delta-discriminative emerging patterns
The support-confidence framework is the most common measure used in itemset mining algorithms, for its antimonotonicity that effectively simplifies the search lattice. This com...
Jinyan Li, Guimei Liu, Limsoon Wong
LCTRTS
2007
Springer
15 years 7 months ago
Addressing instruction fetch bottlenecks by using an instruction register file
The Instruction Register File (IRF) is an architectural extension for providing improved access to frequently occurring instructions. An optimizing compiler can exploit an IRF by ...
Stephen Roderick Hines, Gary S. Tyson, David B. Wh...
109
Voted
MIDDLEWARE
2007
Springer
15 years 7 months ago
AVMEM - Availability-Aware Overlays for Management Operations in Non-cooperative Distributed Systems
Monitoring and management operations that query nodes based on their availability can be extremely useful in a variety of largescale distributed systems containing hundreds to thou...
Ramsés Morales, Brian Cho, Indranil Gupta
« Prev « First page 1072 / 1135 Last » Next »