Sciweavers

2078 search results - page 238 / 416
» MetaCores: Design and Optimization Techniques
Sort
View
PODC
2003
ACM
15 years 3 months ago
Routing networks for distributed hash tables
Routing topologies for distributed hashing in peer-to-peer networks are classified into two categories: deterministic and randomized. A general technique for constructing determi...
Gurmeet Singh Manku
DAC
1998
ACM
15 years 2 months ago
Adjoint Transient Sensitivity Computation in Piecewise Linear Simulation
This paper presents a general method for computing transient sensitivities using the adjoint method in event driven simulation algorithms that employ piecewise linear device model...
Tuyen V. Nguyen, Anirudh Devgan, Ognen J. Nastov
76
Voted
SIGCOMM
1994
ACM
15 years 2 months ago
Experiences with a High-Speed Network Adaptor: A Software Perspective
This paper describes our experiences, from a software perspective, with the OSIRIS network adaptor. It first identifies the problems we encountered while programming OSIRIS and op...
Peter Druschel, Larry L. Peterson, Bruce S. Davie
ICASSP
2009
IEEE
15 years 2 months ago
Frequency invariant MVDR beamforming without filters and implementation using MIMO radar
Abstract-- Frequency invariant beamforming with sensor arrays is generally achieved using filters in the form of tapped delay-lines following each sensor. However it has been recen...
Piya Pal, P. P. Vaidyanathan
CASES
2004
ACM
15 years 1 months ago
Scalable custom instructions identification for instruction-set extensible processors
Extensible processors allow addition of application-specific custom instructions to the core instruction set architecture. However, it is computationally expensive to automaticall...
Pan Yu, Tulika Mitra