Sciweavers

154 search results - page 28 / 31
» A Register Allocation Technique Using Register Existence Gra...
Sort
View
CCS
2003
ACM
14 years 21 days ago
Print signatures for document authentication
We present a novel solution for authenticating printed paper documents by utilizing the inherent non–repeatable randomness existing in the printing process. For a document print...
Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli
ICCAD
2009
IEEE
118views Hardware» more  ICCAD 2009»
13 years 5 months ago
Memory organization and data layout for instruction set extensions with architecturally visible storage
Present application specific embedded systems tend to choose instruction set extensions (ISEs) based on limitations imposed by the available data bandwidth to custom functional un...
Panagiotis Athanasopoulos, Philip Brisk, Yusuf Leb...
HPCC
2007
Springer
13 years 11 months ago
Concurrent Number Cruncher: An Efficient Sparse Linear Solver on the GPU
A wide class of geometry processing and PDE resolution methods needs to solve a linear system, where the non-zero pattern of the matrix is dictated by the connectivity matrix of th...
Luc Buatois, Guillaume Caumon, Bruno Lévy
LCTRTS
2005
Springer
14 years 29 days ago
Cache aware optimization of stream programs
Effective use of the memory hierarchy is critical for achieving high performance on embedded systems. We focus on the class of streaming applications, which is increasingly preval...
Janis Sermulins, William Thies, Rodric M. Rabbah, ...
PLDI
2003
ACM
14 years 21 days ago
Meta optimization: improving compiler heuristics with machine learning
Compiler writers have crafted many heuristics over the years to approximately solve NP-hard problems efficiently. Finding a heuristic that performs well on a broad range of applic...
Mark Stephenson, Saman P. Amarasinghe, Martin C. M...