Sciweavers

339 search results - page 5 / 68
» An ADC-BiST scheme using sequential code analysis
Sort
View
HPCC
2007
Springer
14 years 12 days ago
Checkpointing Aided Parallel Execution Model and Analysis
Abstract. Checkpointing techniques are usually used to secure the execution of sequential and parallel programs. However, they can also be used in order to generate automatically a...
Laura Mereuta, Éric Renault
ICS
2009
Tsinghua U.
14 years 3 months ago
QuakeTM: parallelizing a complex sequential application using transactional memory
“Is transactional memory useful?” is the question that cannot be answered until we provide substantial applications that can evaluate its capabilities. While existing TM appli...
Vladimir Gajinov, Ferad Zyulkyarov, Osman S. Unsal...
CSCW
2011
ACM
13 years 3 months ago
Three sequential positions of query repair in interactions with internet search engines
Internet search engines display understanding or misunderstanding of user intent in and through the particular batches of results they retrieve and their perceived relevance. Yet ...
Robert J. Moore, Elizabeth F. Churchill, Raj Gopal...
ICC
2007
IEEE
119views Communications» more  ICC 2007»
14 years 2 months ago
Performance Analysis of Iteratively Decoded Variable-Length Space-Time Coded Modulation
— It is demonstrated that iteratively Decoded Variable Length Space Time Coded Modulation (VL-STCM-ID) schemes are capable of simultaneously providing both coding gain as well as...
Soon Xin Ng, Wei Liu, Jin Wang, Meixia Tao, Lie-Li...
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 8 months ago
Lossless coding for distributed streaming sources
Distributed source coding is traditionally viewed in the block coding context -- all the source symbols are known in advance at the encoders. This paper instead considers a stream...
Cheng Chang, Stark C. Draper, Anant Sahai