Sciweavers

5675 search results - page 79 / 1135
» Exploiting Chaos for Computation
Sort
View
GEOINFO
2007
14 years 11 months ago
Trajectory Data Warehouses: Proposal of Design and Application to Exploit Data
In this paper we are interested in storing and perform OLAP queries about various aggregate trajectory properties. We consider a data stream environment where a set of mobile objec...
Fernando J. Braz
HPCA
2007
IEEE
15 years 10 months ago
Extending Multicore Architectures to Exploit Hybrid Parallelism in Single-thread Applications
Chip multiprocessors with multiple simpler cores are gaining popularity because they have the potential to drive future performance gains without exacerbating the problems of powe...
Hongtao Zhong, Steven A. Lieberman, Scott A. Mahlk...
ISPASS
2010
IEEE
14 years 7 months ago
Weak execution ordering - exploiting iterative methods on many-core GPUs
Abstract--On NVIDIA's many-core GPUs, there is no synchronization function among parallel thread blocks. When finegranularity of data communication and synchronization is requ...
Jianmin Chen, Zhuo Huang, Feiqi Su, Jih-Kwon Peir,...
ICRA
2008
IEEE
112views Robotics» more  ICRA 2008»
15 years 4 months ago
Balancing exploration and exploitation in motion planning
— Computationally efficient motion planning must avoid exhaustive exploration of configuration space. We argue that this can be accomplished most effectively by carefully balan...
Markus Rickert, Oliver Brock, Alois Knoll
DAC
2006
ACM
15 years 11 months ago
Efficient detection and exploitation of infeasible paths for software timing analysis
Accurate estimation of the worst-case execution time (WCET) of a program is important for real-time embedded software. Static WCET estimation involves program path analysis and ar...
Vivy Suhendra, Tulika Mitra, Abhik Roychoudhury, T...