Sciweavers

5675 search results - page 82 / 1135
» Exploiting Chaos for Computation
Sort
View
EUC
2004
Springer
15 years 3 months ago
VChord: Constructing Peer-to-Peer Overlay Network by Exploiting Heterogeneity
High heterogeneity is an unignoring factor for large-scale peer-to-peer system which leads to the born of VChord. VChord is a peer-to-peer overlay network constructed on Chord aime...
Feng Hong, Minglu Li, Xinda Lu, Yi Wang, Jiadi Yu,...
EUROPAR
2004
Springer
15 years 3 months ago
Exploiting Spatial Store Locality Through Permission Caching in Software DSMs
Abstract. Fine-grained software-based distributed shared memory (SWDSM) systems typically maintain coherence with in-line checking code at load and store operations to shared memor...
Håkan Zeffer, Zoran Radovic, Oskar Grenholm,...
ELPUB
2000
ACM
15 years 2 months ago
Exploiting Web Based Electronic Publishing in the Service of Regional Development: Lessons from Experience
Government institutions, businesses and individual members of society - at least in the developed world are increasingly required to become computer literate and knowledgeable abo...
Colin C. Charlton, Ian Finch, Janet Little, Irene ...
FPL
1998
Springer
99views Hardware» more  FPL 1998»
15 years 2 months ago
Exploiting Contemporary Memory Techniques in Reconfigurable Accelerators
This paper discusses the memory interface of custom computing machines. We present a high speed parallel memory for the MoM-PDA machine, which is based on the Xputer paradigm. The ...
Reiner W. Hartenstein, Michael Herz, Thomas Hoffma...
ICCAD
1996
IEEE
85views Hardware» more  ICCAD 1996»
15 years 2 months ago
Exploiting regularity for low-power design
Abstract -- Current day behavioral-synthesis techniques produce architectures that are power-inefficient in the interconnect. Experiments have demonstrated that in synthesized desi...
Renu Mehra, Jan M. Rabaey