Sciweavers

1088 search results - page 173 / 218
» Independence of Negative Constraints
Sort
View
ISCA
1992
IEEE
125views Hardware» more  ISCA 1992»
15 years 1 months ago
Limits of Control Flow on Parallelism
This paper discusses three techniques useful in relaxing the constraints imposed by control flow on parallelism: control dependence analysis, executing multiple flows of control s...
Monica S. Lam, Robert P. Wilson
DCOSS
2007
Springer
15 years 1 months ago
Energy Efficient Intrusion Detection in Camera Sensor Networks
The problem we address in this paper is how to detect an intruder moving through a polygonal space that is equipped with a camera sensor network. We propose a probabilistic sensor ...
Primoz Skraba, Leonidas J. Guibas
DAC
2010
ACM
15 years 1 months ago
Performance yield-driven task allocation and scheduling for MPSoCs under process variation
With the ever-increasing transistor variability in CMOS technology, it is essential to integrate variation-aware performance analysis into the task allocation and scheduling proce...
Lin Huang, Qiang Xu
GECCO
2007
Springer
189views Optimization» more  GECCO 2007»
15 years 1 months ago
A genetic algorithm with exon shuffling crossover for hard bin packing problems
A novel evolutionary approach for the bin packing problem (BPP) is presented. A simple steady-state genetic algorithm is developed that produces results comparable to other approa...
Philipp Rohlfshagen, John A. Bullinaria
EDOC
2009
IEEE
15 years 1 months ago
Realizing Correspondences in Multi-viewpoint Specifications
Viewpoint modeling is an effective technique for specifying complex software systems in terms of a set of independent viewpoints and correspondences between them. Each viewpoint f...
José Raúl Romero, Juan Ignacio Jaen,...