Sciweavers

5675 search results - page 97 / 1135
» Exploiting Chaos for Computation
Sort
View
DAC
2004
ACM
15 years 11 months ago
Exploiting structure in symmetry detection for CNF
Instances of the Boolean satisfiability problem (SAT) arise in many areas of circuit design and verification. These instances are typically constructed from some human-designed ar...
Paul T. Darga, Mark H. Liffiton, Karem A. Sakallah...
DAC
2006
ACM
15 years 11 months ago
Exploiting forwarding to improve data bandwidth of instruction-set extensions
Application-specific instruction-set extensions (custom instructions) help embedded processors achieve higher performance. Most custom instructions offering significant performanc...
Ramkumar Jayaseelan, Haibin Liu, Tulika Mitra
MOBIHOC
2002
ACM
15 years 9 months ago
Topology management for sensor networks: exploiting latency and density
In wireless sensor networks, energy efficiency is crucial to achieve satisfactory network lifetime. In order to reduce the energy consumption of a node significantly, its radio ne...
Curt Schurgers, Vlasios Tsiatsis, Saurabh Ganeriwa...
ECIR
2009
Springer
15 years 7 months ago
Exploiting Visual Concepts to Improve Text-Based Image Retrieval
In this paper, we study how to automatically exploit visual concepts in a text-based image retrieval task. First, we use Forest of Fuzzy Decision Trees (FFDTs) to automatically ann...
Sabrina Tollari, Marcin Detyniecki, Christophe Mar...
MDM
2009
Springer
118views Communications» more  MDM 2009»
15 years 4 months ago
DigestJoin: Exploiting Fast Random Reads for Flash-Based Joins
Abstract—Flash disks have been an emerging secondary storage media. In particular, there have been portable devices, multimedia players and laptop computers that are configured ...
Yu Li, Sai Tung On, Jianliang Xu, Byron Choi, Haib...