Sciweavers

5344 search results - page 297 / 1069
» Privacy-Preserving Set Operations
Sort
View
WADS
2007
Springer
115views Algorithms» more  WADS 2007»
15 years 10 months ago
Priority Queues Resilient to Memory Faults
In the faulty-memory RAM model, the content of memory cells can get corrupted at any time during the execution of an algorithm, and a constant number of uncorruptible registers are...
Allan Grønlund Jørgensen, Gabriel Mo...
ETS
2006
IEEE
129views Hardware» more  ETS 2006»
15 years 10 months ago
Dynamic Voltage Scaling Aware Delay Fault Testing
The application of Dynamic Voltage Scaling (DVS) to reduce energy consumption may have a detrimental impact on the quality of manufacturing tests employed to detect permanent faul...
Noohul Basheer Zain Ali, Mark Zwolinski, Bashir M....
IOLTS
2006
IEEE
103views Hardware» more  IOLTS 2006»
15 years 10 months ago
Designing Robust Checkers in the Presence of Massive Timing Errors
So far, performance and reliability of circuits have been determined by worst-case characterization of silicon and environmental noise. As new deep sub-micron technologies exacerb...
Frederic Worm, Patrick Thiran, Paolo Ienne
ASPLOS
2006
ACM
15 years 10 months ago
Accelerator: using data parallelism to program GPUs for general-purpose uses
GPUs are difficult to program for general-purpose uses. Programmers can either learn graphics APIs and convert their applications to use graphics pipeline operations or they can ...
David Tarditi, Sidd Puri, Jose Oglesby
ICRA
2005
IEEE
140views Robotics» more  ICRA 2005»
15 years 10 months ago
Adaptive Virtual Fixtures for Machine-Assisted Teleoperation Tasks
— It has been demonstrated in a number of robotic areas how the use of virtual fixtures improves task performance both in terms of execution time and overall precision, [1]. How...
Daniel Aarno, Staffan Ekvall, Danica Kragic