Sciweavers

1079 search results - page 71 / 216
» An Implementation of an Address Generator Using Hash Memorie...
Sort
View
CODES
2007
IEEE
14 years 3 months ago
Predator: a predictable SDRAM memory controller
Memory requirements of intellectual property components (IP) in contemporary multi-processor systems-on-chip are increasing. Large high-speed external memories, such as DDR2 SDRAM...
Benny Akesson, Kees Goossens, Markus Ringhofer
HPCA
2006
IEEE
14 years 9 months ago
LogTM: log-based transactional memory
Transactional memory (TM) simplifies parallel programming by guaranteeing that transactions appear to execute atomically and in isolation. Implementing these properties includes p...
Kevin E. Moore, Jayaram Bobba, Michelle J. Moravan...
CVPR
1996
IEEE
14 years 1 months ago
Connectionist networks for feature indexing and object recognition
Feature indexing techniques are promising for object recognition since they can quickly reduce the set of possible matches for a set of image features. This work exploits another ...
Clark F. Olson
TKDE
2010
159views more  TKDE 2010»
13 years 7 months ago
The Tiled Bitmap Forensic Analysis Algorithm
— Tampering of a database can be detected through the use of cryptographically-strong hash functions. Subsequently-applied forensic analysis algorithms can help determine when, w...
Kyriacos E. Pavlou, Richard T. Snodgrass
NLDB
2001
Springer
14 years 1 months ago
"Where Are the Christmas Decorations?": A Memory Assistant for Storage Locations
At Hewlett-Packard Laboratories we want to know how inexpensive it can be to endow mobile personal assistants with the ability to speak naturally with their users. To this end, we ...
Lewis G. Creary, Michael VanHilst