Sciweavers

3303 search results - page 528 / 661
» Multidimensional Access Methods
Sort
View
156
Voted
MMMACNS
2001
Springer
15 years 9 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
UM
2001
Springer
15 years 9 months ago
User Modelling in I-Help: What, Why, When and How
This paper describes user modelling in I-Help, a system to facilitate communication amongst learners. There are two I-Help components: Private and Public Discussions. In the Privat...
Susan Bull, Jim E. Greer, Gordon I. McCalla, Lori ...
DCC
2000
IEEE
15 years 9 months ago
Arithmetic Coding for Low Power Embedded System Design
We present a novel algorithm that assigns codes to instructions during instruction code compression in order to minimize bus-related bit-toggling and thus reducing power consumpti...
Haris Lekatsas, Wayne Wolf, Jörg Henkel
156
Voted
IEEEPACT
2000
IEEE
15 years 9 months ago
Global Register Partitioning
Modern computers have taken advantage of the instruction-level parallelism (ILP) available in programs with advances in both architecture and compiler design. Unfortunately, large...
Jason Hiser, Steve Carr, Philip H. Sweany
125
Voted
MICRO
2000
IEEE
80views Hardware» more  MICRO 2000»
15 years 9 months ago
Silent stores for free
Silent store instructions write values that exactly match the values that are already stored at the memory address that is being written. A recent study reveals that significant ...
Kevin M. Lepak, Mikko H. Lipasti