Sciweavers

1474 search results - page 133 / 295
» Exploiting Locality in a TMS
Sort
View
ICML
2005
IEEE
16 years 5 months ago
Near-optimal sensor placements in Gaussian processes
When monitoring spatial phenomena, which are often modeled as Gaussian Processes (GPs), choosing sensor locations is a fundamental task. A common strategy is to place sensors at t...
Carlos Guestrin, Andreas Krause, Ajit Paul Singh
HPCA
2004
IEEE
16 years 4 months ago
Stream Register Files with Indexed Access
Many current programmable architectures designed to exploit data parallelism require computation to be structured to operate on sequentially accessed vectors or streams of data. A...
Nuwan Jayasena, Mattan Erez, Jung Ho Ahn, William ...
CADE
2001
Springer
16 years 4 months ago
Termination and Reduction Checking for Higher-Order Logic Programs
In this paper, we present a syntax-directed termination and reduction checker for higher-order logic programs. The reduction checker verifies parametric higher-order subterm orderi...
Brigitte Pientka
ICIAP
2005
ACM
16 years 4 months ago
3D Database Population from Single Views of Surfaces of Revolution
Solids of revolution (vases, bottles, bells, . . .), shortly SORs, are very common objects in man-made environments. We present a complete framework for 3D database population from...
Carlo Colombo, Dario Comanducci, Alberto Del Bimbo...
ICCAD
2008
IEEE
153views Hardware» more  ICCAD 2008»
16 years 1 months ago
Boolean factoring and decomposition of logic networks
This paper presents new methods for restructuring logic networks based on fast Boolean techniques. The basis for these are 1) a cut based view of a logic network, 2) exploiting th...
Alan Mishchenko, Robert K. Brayton, Satrajit Chatt...