Sciweavers

617 search results - page 117 / 124
» Impact of problem centralization in distributed constraint o...
Sort
View
108
Voted
CODES
2004
IEEE
15 years 4 months ago
Operation tables for scheduling in the presence of incomplete bypassing
Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing ha...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...
133
Voted
DIALM
2005
ACM
130views Algorithms» more  DIALM 2005»
15 years 2 months ago
On lower bounds for MAC layer contention in CSMA/CA-based wireless networks
Wireless LANs operating within unlicensed frequency bands require random access schemes such as CSMA/CA, so that wireless networks from different administrative domains (for exam...
Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt
90
Voted
ICCV
1999
IEEE
16 years 2 months ago
Roxels: Responsibility Weighted 3D Volume Reconstruction
This paper examines the problem of reconstructing a voxelized representation of 3D space from a series of images. An iterative algorithm is used to find the scene model which join...
Jeremy S. De Bonet, Paul A. Viola
DAC
1997
ACM
15 years 4 months ago
COSYN: Hardware-Software Co-Synthesis of Embedded Systems
: Hardware-software co-synthesis is the process of partitioning an embedded system specification into hardware and software modules to meet performance, power and cost goals. In t...
Bharat P. Dave, Ganesh Lakshminarayana, Niraj K. J...
IPPS
2009
IEEE
15 years 7 months ago
A resource allocation approach for supporting time-critical applications in grid environments
— There are many grid-based applications where a timely response to an important event is needed. Often such response can require a significant computation and possibly communic...
Qian Zhu, Gagan Agrawal