Sciweavers

5675 search results - page 45 / 1135
» Exploiting Chaos for Computation
Sort
View
DSN
2006
IEEE
14 years 5 months ago
In-Register Duplication: Exploiting Narrow-Width Value for Improving Register File Reliability
Protecting the register value and its data buses is crucial to reliable computing in high-performance microprocessors due to the increasing susceptibility of CMOS circuitry to sof...
Jie Hu, Shuai Wang, Sotirios G. Ziavras
PPOPP
2003
ACM
14 years 4 months ago
Exploiting high-level coherence information to optimize distributed shared state
InterWeave is a distributed middleware system that supports the sharing of strongly typed, pointer-rich data structures across a wide variety of hardware architectures, operating ...
DeQing Chen, Chunqiang Tang, Brandon Sanders, Sand...
IJAOSE
2007
82views more  IJAOSE 2007»
13 years 11 months ago
West2East: exploiting WEb Service Technologies to Engineer Agent-based SofTware
This paper describes West2East, a Computer-Aided Agent-Oriented Software Engineering toolkit aimed at supporting the implementation of multiagent systems. West2East exploits langua...
Giovanni Casella, Viviana Mascardi
CVPR
2011
IEEE
13 years 2 months ago
Exploiting Phonological Constraints for Handshape Inference in ASL Video
Handshape is a key linguistic component of signs, and thus, handshape recognition is essential to algorithms for sign language recognition and retrieval. In this work, linguistic ...
Ashwin Thangali, Stan Sclaroff, Carol Neidle, Joan...
ICASSP
2011
IEEE
13 years 2 months ago
Exploiting sparseness of backing-off language models for efficient look-ahead in LVCSR
In this paper, we propose a new method for computing and applying language model look-ahead in a dynamic network decoder, exploiting the sparseness of backing-off n-gram language ...
David Nolden, Hermann Ney, Ralf Schlüter