Sciweavers

1474 search results - page 143 / 295
» Exploiting Locality in a TMS
Sort
View
ACSAC
2000
IEEE
15 years 8 months ago
Policy Mediation for Multi-Enterprise Environments
Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However, few, if any, tools exist that support access...
Pablo Galiasso, Oliver Bremer, John Hale, Sujeet S...
ISSS
2000
IEEE
111views Hardware» more  ISSS 2000»
15 years 8 months ago
Systematic Data Reuse Exploration Methodology for Irregular Access Patterns
Efficient use of an optimized custom memory hierarchy to exploit temporal locality in the memory accesses on array signals can have a very large impact on the power consumption i...
Tanja Van Achteren, Rudy Lauwereins, Francky Catth...
VISUALIZATION
2000
IEEE
15 years 8 months ago
Six degree-of-freedom haptic display of polygonal models
: We present an algorithm for haptic display of moderately complex polygonal models with a six degree of freedom (DOF) force feedback device. We make use of incremental algorithms ...
Arthur D. Gregory, Ajith Mascarenhas, Stephen A. E...
CP
2000
Springer
15 years 8 months ago
New Search Heuristics for Max-CSP
Abstract. This paper evaluates the power of a new scheme that generates search heuristics mechanically. This approach was presented and evaluated rst in the context of optimization...
Kalev Kask
ICRA
1999
IEEE
82views Robotics» more  ICRA 1999»
15 years 8 months ago
An Investigation into Non-Smooth Locomotion
We analyze a class of mechanisms that locomote by switching between constraints. Because of the hybrid nature of such systems, most of the existing analysis tools, developed prima...
Milos Zefran, Francesco Bullo, Jim Radford