Sciweavers

1031 search results - page 48 / 207
» On the Effects of Bandwidth Reduction Techniques in Distribu...
Sort
View
ISSS
1996
IEEE
134views Hardware» more  ISSS 1996»
15 years 1 months ago
ADOPT: Efficient Hardware Address Generation in Distributed Memory Architectures
An address generation and optimization environment (ADOPT) for distributed memory architectures, is presented. ADOPT is oriented to minimize the area overhead introduced by the us...
Miguel Miranda, Francky Catthoor, Martin Janssen, ...
ISCA
2007
IEEE
149views Hardware» more  ISCA 2007»
15 years 4 months ago
Virtual private caches
Virtual Private Machines (VPM) provide a framework for Quality of Service (QoS) in CMP-based computer systems. VPMs incorporate microarchitecture mechanisms that allow shares of h...
Kyle J. Nesbit, James Laudon, James E. Smith
CIT
2006
Springer
15 years 1 months ago
A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform
Hash functions play the most important role in various cryptologic applications, ranging from data integrity checking to digital signatures. Our goal is to introduce a new hash fu...
Barzan Mozafari, Mohammad Hasan Savoji
CORR
2010
Springer
140views Education» more  CORR 2010»
14 years 8 months ago
On Scaling Laws of Diversity Schemes in Decentralized Estimation
This paper is concerned with decentralized estimation of a Gaussian source using multiple sensors. We consider a diversity scheme where only the sensor with the best channel sends...
Alex S. Leong, Subhrakanti Dey
KDD
2004
ACM
138views Data Mining» more  KDD 2004»
15 years 10 months ago
IDR/QR: an incremental dimension reduction algorithm via QR decomposition
Dimension reduction is a critical data preprocessing step for many database and data mining applications, such as efficient storage and retrieval of high-dimensional data. In the ...
Jieping Ye, Qi Li, Hui Xiong, Haesun Park, Ravi Ja...