Sciweavers

8468 search results - page 1623 / 1694
» The Technology of Data Stashing
Sort
View
MICRO
2005
IEEE
130views Hardware» more  MICRO 2005»
15 years 3 months ago
Exploiting Vector Parallelism in Software Pipelined Loops
An emerging trend in processor design is the addition of short vector instructions to general-purpose and embedded ISAs. Frequently, these extensions are employed using traditiona...
Samuel Larsen, Rodric M. Rabbah, Saman P. Amarasin...
RTAS
2005
IEEE
15 years 3 months ago
Out-of-Norm Assertions
Abstract— The increasing use of electronics in transport systems, such as the automotive and avionic domain, has lead to dramatic improvements with respect to functionality, safe...
Philipp Peti, Roman Obermaisser, Hermann Kopetz
HT
2005
ACM
15 years 3 months ago
From the writable web to global editability
The technical and competence requirements for writing content on the web is still one of the major factors that widens the gap between authors and readers. Although tools that sup...
Angelo Di Iorio, Fabio Vitali
IMC
2005
ACM
15 years 3 months ago
Understanding Congestion in IEEE 802.11b Wireless Networks
The growing popularity of wireless networks has led to cases of heavy utilization and congestion. In heavily utilized wireless networks, the wireless portion of the network is a m...
Amit P. Jardosh, Krishna N. Ramachandran, Kevin C....
ISLPED
2005
ACM
103views Hardware» more  ISLPED 2005»
15 years 3 months ago
A technique for low energy mapping and routing in network-on-chip architectures
Network-on-chip (NoC) has been proposed as a solution for the global communication challenges of System-on-chip (SoC) design in the nanoscale technologies. NoC design with mesh ba...
Krishnan Srinivasan, Karam S. Chatha
« Prev « First page 1623 / 1694 Last » Next »