Sciweavers

5675 search results - page 67 / 1135
» Exploiting Chaos for Computation
Sort
View
CF
2005
ACM
14 years 12 months ago
Exploiting temporal locality in drowsy cache policies
Technology projections indicate that static power will become a major concern in future generations of high-performance microprocessors. Caches represent a significant percentage ...
Salvador Petit, Julio Sahuquillo, Jose M. Such, Da...
CGF
2008
137views more  CGF 2008»
14 years 10 months ago
Exploiting Visibility Correlation in Direct Illumination
The visibility function in direct illumination describes the binary visibility over a light source, e.g., an environment map. Intuitively, the visibility is often strongly correla...
Petrik Clarberg, Tomas Akenine-Möller
SAC
2008
ACM
14 years 9 months ago
Exploiting program cyclic behavior to reduce memory latency in embedded processors
In this work we modify the conventional row buffer allocation mechanism used in DDR2 SDRAM banks to improve average memory latency and overall processor performance. Our method as...
Ehsan Atoofian, Amirali Baniasadi
SOCA
2010
IEEE
14 years 7 months ago
Exploiting multicores to optimize business process execution
While modern CPUs offer an increasing number of cores with shared caches, prevailing execution engines for business processes, workflows, or Web service compositions have not been ...
Achille Peternier, Daniele Bonetta, Cesare Pautass...
CVPR
2011
IEEE
14 years 6 months ago
Detection Free Tracking: Exploiting Motion and Topology for Segmenting and Tracking under Entanglement.
Our goal is to segment multiple interacting and deforming agents in a video. Detectors often fail under large body deformation or agent entanglement. On the other hand, segmenting...
Katerina Fragkiadaki, Jianbo Shi