Sciweavers

1184 search results - page 90 / 237
» Memory Design for Constrained Dynamic Optimization Problems
Sort
View
DCC
2008
IEEE
16 years 2 months ago
High-Resolution Functional Quantization
Suppose a function of N real source variables XN 1 = (X1, X2, . . . , XN ) is desired at a destination constrained to receive a limited number of bits. If the result of evaluating...
Vinith Misra, Vivek K. Goyal, Lav R. Varshney
ISCA
2010
IEEE
305views Hardware» more  ISCA 2010»
15 years 7 months ago
Rethinking DRAM design and organization for energy-constrained multi-cores
DRAM vendors have traditionally optimized the cost-perbit metric, often making design decisions that incur energy penalties. A prime example is the overfetch feature in DRAM, wher...
Aniruddha N. Udipi, Naveen Muralimanohar, Niladris...
119
Voted
ICC
2007
IEEE
101views Communications» more  ICC 2007»
15 years 9 months ago
On the Limitations of Random Sensor Placement for Distributed Signal Detection
— We consider the design of a sensor network for detecting an emitter who if present is known to be located in an interval but whose exact position is unknown. We seek to minimiz...
Zhenyu Tu, Rick S. Blum
GREC
2005
Springer
15 years 8 months ago
Online Composite Sketchy Shape Recognition Using Dynamic Programming
This paper presents a solution for online composite sketchy shape recognition. The kernel of the strategy treats both stroke segmentation and sketch recognition as an optimization ...
Zhengxing Sun, Bo Yuan, Jianfeng Yin
93
Voted
SRDS
2006
IEEE
15 years 8 months ago
How To Safeguard Your Sensitive Data
In order to safeguard a sensitive database, we must ensure both its privacy and its longevity. However, privacy and longevity tend to be competing objectives. We show how to desig...
Bob Mungamuru, Hector Garcia-Molina, Subhasish Mit...