Sciweavers

1296 search results - page 52 / 260
» Exploiting communication concurrency on high performance com...
Sort
View
SASP
2009
IEEE
291views Hardware» more  SASP 2009»
15 years 5 months ago
FCUDA: Enabling efficient compilation of CUDA kernels onto FPGAs
— As growing power dissipation and thermal effects disrupted the rising clock frequency trend and threatened to annul Moore’s law, the computing industry has switched its route...
Alexandros Papakonstantinou, Karthik Gururaj, John...
GLOBECOM
2010
IEEE
14 years 9 months ago
Relay-Induced Error Propagation Reduction for Decode-and-Forward Cooperative Communications
An attractive hybrid method of mitigating the effects of error propagation that may be imposed by the relay node (RN) on the destination node (DN) is proposed. We selected the most...
Dandan Liang, Soon Xin Ng, Lajos Hanzo
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 3 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
MOBISYS
2010
ACM
15 years 1 months ago
CrowdSearch: exploiting crowds for accurate real-time image search on mobile phones
Mobile phones are becoming increasingly sophisticated with a rich set of on-board sensors and ubiquitous wireless connectivity. However, the ability to fully exploit the sensing c...
Tingxin Yan, Vikas Kumar, Deepak Ganesan
ICC
2007
IEEE
102views Communications» more  ICC 2007»
15 years 5 months ago
Accurate Performance Analysis of TR UWB Systems With Arbitrary Front-end Filters
—The sampling expansion approach for computing the performance of TR UWB systems has restricted validity and is very inaccurate in some cases. A new analytical method to evaluate...
Somasundaram Niranjayan, Norman C. Beaulieu