Sciweavers

790 search results - page 96 / 158
» Limits of Work-Stealing Scheduling
Sort
View
102
Voted
DAC
2006
ACM
16 years 1 months ago
Leakage power reduction of embedded memories on FPGAs through location assignment
Transistor leakage is poised to become the dominant source of power dissipation in digital systems, and reconfigurable devices are not immune to this problem. Modern FPGAs already...
Yan Meng, Timothy Sherwood, Ryan Kastner
PERCOM
2006
ACM
16 years 6 days ago
Virtual Channel Management for Densely Deployed IEEE 802.15.4 LR-WPANs
The number of channels specified for IEEE 802.15.4 Low-Rate Wireless Personal Area Networks (LR-WPANs) is too few to operate many applications of WPANs in the same area. To overco...
Tae-Hyun Kim, Jae Yeol Ha, Sunghyun Choi, Wook Hyu...
118
Voted
MOBIHOC
2008
ACM
16 years 6 days ago
Towards energy efficient VoIP over wireless LANs
Wireless LAN (WLAN) radios conserve energy by staying in sleep mode. With real-time applications like VoIP, it is not clear how much energy can be saved by this approach since pac...
Vinod Namboodiri, Lixin Gao
86
Voted
ICCAD
2003
IEEE
124views Hardware» more  ICCAD 2003»
15 years 9 months ago
Gradual Relaxation Techniques with Applications to Behavioral Synthesis
Heuristics are widely used for solving computational intractable synthesis problems. However, until now, there has been limited effort to systematically develop heuristics that ca...
Zhiru Zhang, Yiping Fan, Miodrag Potkonjak, Jason ...
103
Voted
TLDI
2010
ACM
210views Formal Methods» more  TLDI 2010»
15 years 9 months ago
Effects for cooperable and serializable threads
Reasoning about the correctness of multithreaded programs is complicated by the potential for unexpected interference between threads. Previous work on controlling thread interfer...
Jaeheon Yi, Cormac Flanagan