Sciweavers

1474 search results - page 144 / 295
» Exploiting Locality in a TMS
Sort
View
FGR
1998
IEEE
208views Biometrics» more  FGR 1998»
15 years 8 months ago
Locating Facial Region of a Head-and-Shoulders Color Image
This paper addresses our proposed method to automatically locate the person's face from a given image that consists of a head-and-shoulders view of the person and a complex b...
Douglas Chai, King N. Ngan
ICDCS
1998
IEEE
15 years 8 months ago
Granularity Control for Distributed Execution of Logic Programs
Distributed execution of logic programs requires a match of granularity between a program and the distributed multi-processor it runs on to exploit its potential for performance f...
George Xirogiannis
POS
1998
Springer
15 years 8 months ago
Lumberjack: A Log-Structured Persistent Object Store
Lumberjack is a log-structured persistent object store intended for use with conventional operating systems such as Unix. The design draws together facets of previous work, in par...
David Hulse, Alan Dearle
ISLPED
1997
ACM
95views Hardware» more  ISLPED 1997»
15 years 8 months ago
Formalized methodology for data reuse exploration in hierarchical memory mappings
Efficient use of an optimized memory hierarchy to exploit temporal locality in the memory accesses on array signals can have a very large impact on the power consumption in data ...
Jean-Philippe Diguet, Sven Wuytack, Francky Cattho...
ISLPED
1997
ACM
130views Hardware» more  ISLPED 1997»
15 years 8 months ago
Analytical energy dissipation models for low-power caches
We present detailed analytical models for estimating the energy dissipation in conventional caches as well as low energy cache architectures. The analytical models use the run tim...
Milind B. Kamble, Kanad Ghose