Sciweavers

1474 search results - page 21 / 295
» Exploiting Locality in a TMS
Sort
View
ISCA
2009
IEEE
150views Hardware» more  ISCA 2009»
15 years 6 months ago
Stream chaining: exploiting multiple levels of correlation in data prefetching
Data prefetching has long been an important technique to amortize the effects of the memory wall, and is likely to remain so in the current era of multi-core systems. Most prefetc...
Pedro Diaz, Marcelo Cintra
IPPS
2007
IEEE
15 years 6 months ago
Load Miss Prediction - Exploiting Power Performance Trade-offs
— Modern CPUs operate at GHz frequencies, but the latencies of memory accesses are still relatively large, in the order of hundreds of cycles. Deeper cache hierarchies with large...
Konrad Malkowski, Greg M. Link, Padma Raghavan, Ma...
AAIM
2005
Springer
110views Algorithms» more  AAIM 2005»
15 years 5 months ago
Dynamically Updating the Exploiting Parameter in Improving Performance of Ant-Based Algorithms
Abstract. The utilization of pseudo-random proportional rule to balance between the exploitation and exploration of the search process was shown in Ant Colony System (ACS) algorith...
Hoang Trung Dinh, Abdullah Al Mamun, Hieu T. Dinh
WSCG
2004
264views more  WSCG 2004»
15 years 1 months ago
Image Registration Exploiting Five-Point Coplanar Perspective Invariant and Maximum-Curvature Point
Image registrations have been a subject of extensive study over the last decade. They appear in numerous applications including Computer Vision, Pattern Recognition, Medical Image...
Parichart Putjarupong, Chuchart Pintavirooj, Witha...
MOBIHOC
2003
ACM
15 years 11 months ago
A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks
Directional antennas in ad hoc networks offer many benefits compared with classical omnidirectional antennas. The most important include significant increase of spatial reuse, cov...
Thanasis Korakis, Gentian Jakllari, Leandros Tassi...