Sciweavers

5358 search results - page 1061 / 1072
» Script-based Presentation of Simulation Results
Sort
View
SIGARCH
2008
96views more  SIGARCH 2008»
14 years 11 months ago
Towards hybrid last level caches for chip-multiprocessors
As CMP platforms are widely adopted, more and more cores are integrated on to the die. To reduce the off-chip memory access, the last level cache is usually organized as a distribu...
Li Zhao, Ravi Iyer, Mike Upton, Don Newell
IJCV
2007
155views more  IJCV 2007»
14 years 11 months ago
3D Reconstruction by Shadow Carving: Theory and Practical Evaluation
Abstract. Cast shadows are an informative cue to the shape of objects. They are particularly valuable for discovering object’s concavities which are not available from other cues...
Silvio Savarese, Marco Andreetto, Holly E. Rushmei...
IJISEC
2007
61views more  IJISEC 2007»
14 years 11 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
IJWMC
2007
111views more  IJWMC 2007»
14 years 11 months ago
Adaptive semi-soft handoff for Cellular IP networks
—Rapid advances in wireless networking have led to more mobile phones, PDAs, and other digital mobile devices becoming ubiquitously connected to the Internet. As the demand of de...
Eriko Nurvitadhi, Ben Lee, Chansu Yu, Myungchul Ki...
TCAD
2008
96views more  TCAD 2008»
14 years 11 months ago
An Implicit Approach to Minimizing Range-Equivalent Circuits
Abstract--Simplifying a combinational circuit while preserving its range has a variety of applications, such as combinational equivalence checking and random simulation. Previous a...
Yung-Chih Chen, Chun-Yao Wang
« Prev « First page 1061 / 1072 Last » Next »