Sciweavers

1474 search results - page 190 / 295
» Exploiting Locality in a TMS
Sort
View
ICCD
2002
IEEE
164views Hardware» more  ICCD 2002»
16 years 1 months ago
Locating Tiny Sensors in Time and Space: A Case Study
— As the cost of embedded sensors and actuators drops, new applications will arise that exploit high density networks of small devices capable of a variety of sensing tasks. Alth...
Lewis Girod, Vladimir Bychkovskiy, Jeremy Elson, D...
136
Voted
ICCD
2002
IEEE
132views Hardware» more  ICCD 2002»
16 years 1 months ago
Applying Decay Strategies to Branch Predictors for Leakage Energy Savings
With technology advancing toward deep submicron, leakage energy is of increasing concern, especially for large onchip array structures such as caches and branch predictors. Recent...
Zhigang Hu, Philo Juang, Kevin Skadron, Douglas W....
ICCAD
2004
IEEE
138views Hardware» more  ICCAD 2004»
16 years 1 months ago
A thermal-driven floorplanning algorithm for 3D ICs
As the technology progresses, interconnect delays have become bottlenecks of chip performance. Three dimensional (3D) integrated circuits are proposed as one way to address this p...
Jason Cong, Jie Wei, Yan Zhang
SOSP
2001
ACM
16 years 1 months ago
A Low-Bandwidth Network File System
Users rarely consider running network file systems over slow or wide-area networks, as the performance would be unacceptable and the bandwidth consumption too high. Nonetheless, ...
Athicha Muthitacharoen, Benjie Chen, David Mazi&eg...
CVPR
2010
IEEE
16 years 1 months ago
A Content-Aware Image Prior
In image restoration tasks, a heavy-tailed gradient distribution of natural images has been extensively exploited as an image prior. Most image restoration algorithms impose a spa...
Taeg Sang Cho, Neel Joshi, Larry Zitnick, Sing Bin...