Sciweavers

5675 search results - page 86 / 1135
» Exploiting Chaos for Computation
Sort
View
ICNP
2003
IEEE
15 years 3 months ago
Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays
Structured peer-to-peer overlays provide a natural infrastructure for resilient routing via efficient fault detection and precomputation of backup paths. These overlays can respo...
Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony...
EUROPAR
2003
Springer
15 years 3 months ago
Exploiting On-Chip Data Transfers for Improving Performance of Chip-Scale Multiprocessors
As compared to a complex single processor based system, on-chip multiprocessors are less complex, more power efficient, and easier to test and validate. In this work, we focus on a...
Guangyu Chen, Mahmut T. Kandemir, Alok N. Choudhar...
DAC
2009
ACM
15 years 2 months ago
Exploiting "architecture for verification" to streamline the verification process
A typical hardware development flow starts the verification process concurrently with RTL, but the overall schedule becomes limited by the effort required to complete all the nece...
Dave Whipp
AFRIGRAPH
2001
ACM
15 years 1 months ago
Exploiting coherence of shadow rays
We present independent method to reduce the number of shadow ray tests. It can be used with standard acceleration ray tracing algorithms. Our method is conservative and produces t...
Andrzej Lukaszewski
AAAI
2004
14 years 11 months ago
Towards Efficient Sampling: Exploiting Random Walk Strategies
From a computational perspective, there is a close connection between various probabilistic reasoning tasks and the problem of counting or sampling satisfying assignments of a pro...
Wei Wei, Jordan Erenrich, Bart Selman