Sciweavers

192 search results - page 33 / 39
» An autonomous explore exploit strategy
Sort
View
DAC
2003
ACM
14 years 1 months ago
Test application time and volume compression through seed overlapping
We propose in this paper an extension on the Scan Chain Concealment technique to further reduce test time and volume requirement. The proposed methodology stems from the architect...
Wenjing Rao, Ismet Bayraktaroglu, Alex Orailoglu
DL
2000
Springer
162views Digital Library» more  DL 2000»
14 years 2 days ago
Snowball: extracting relations from large plain-text collections
Text documents often contain valuable structured data that is hidden in regular English sentences. This data is best exploited if available as a relational table that we could use...
Eugene Agichtein, Luis Gravano
HPCA
1998
IEEE
14 years 1 hour ago
Supporting Highly-Speculative Execution via Adaptive Branch Trees
Most of the prediction mechanisms predict a single path to continue the execution on a branch. Alternatively, we may exploit parallelism from either possible paths of a branch, di...
Tien-Fu Chen
CLUSTER
2004
IEEE
13 years 11 months ago
Scalable, high-performance NIC-based all-to-all broadcast over Myrinet/GM
All-to-all broadcast is one of the common collective operations that involve dense communication between all processes in a parallel program. Previously, programmable Network Inte...
Weikuan Yu, Dhabaleswar K. Panda, Darius Buntinas
ICASSP
2007
IEEE
13 years 9 months ago
A Flexible Video Transmission System Based on JPEG 2000 Conditional Replenishment with Multiple References
The image compression standard JPEG 2000 offers a high compression ef ciency as well as a great exibility in the way it accesses the content in terms of spatial location, quality ...
François-Olivier Devaux, Jérôm...