Sciweavers

2663 search results - page 173 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
ICDAR
2009
IEEE
14 years 8 months ago
PixLabeler: User Interface for Pixel-Level Labeling of Elements in Document Images
We present a user interface design for labeling elements in document images at a pixel level. Labels are represented by overlay color, which might map to such terms as "handw...
Eric Saund, Jing Lin, Prateek Sarkar
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
15 years 4 months ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...
ANCS
2005
ACM
15 years 3 months ago
Gigabit routing on a software-exposed tiled-microprocessor
This paper investigates the suitability of emerging tiled-architectures, equipped with low-latency on-chip networks, for high-performance network routing. In this paper, we presen...
Umar Saif, James W. Anderson, Anthony Degangi, Ana...
MICRO
1999
IEEE
98views Hardware» more  MICRO 1999»
15 years 2 months ago
Instruction Fetch Mechanisms for Multipath Execution Processors
Branch mispredictions can have a major performance impact on high-performance processors. Multipath execution has recently been introduced to help limit the misprediction penaltie...
Artur Klauser, Dirk Grunwald
HEURISTICS
2008
136views more  HEURISTICS 2008»
14 years 9 months ago
Enhancing set constraint solvers with lexicographic bounds
Since their beginning in constraint programming, set solvers have been applied to a wide range of combinatorial search problems, such as bin-packing, set partitioning, circuit desi...
Andrew Sadler, Carmen Gervet