Sciweavers

35 search results - page 2 / 7
» Exploiting Cycle Structures in Max-SAT
Sort
View
SAC
2006
ACM
14 years 1 months ago
Branchless cycle prediction for embedded processors
Modern embedded processors access the Branch Target Buffer (BTB) every cycle to speculate branch target addresses. Such accesses, quite often, are unnecessary as there is no branc...
Kaveh Jokar Deris, Amirali Baniasadi
ICC
2008
IEEE
124views Communications» more  ICC 2008»
14 years 1 months ago
Sidewalk: A RFID Tag Anti-Collision Algorithm Exploiting Sequential Arrangements of Tags
Abstract—Although predicting the RFID tag distribution before a read cycle begins would be generally difficult and even futile, a likely and interesting scenario is where the ta...
Hyunho Koh, Sangki Yun, Hyogon Kim
ICCV
2007
IEEE
14 years 9 months ago
Untangling Cycles for Contour Grouping
We introduce a novel topological formulation for contour grouping. Our grouping criterion, called untangling cycles, exploits the inherent topological 1D structure of salient cont...
Qihui Zhu, Gang Song, Jianbo Shi
CDC
2008
IEEE
216views Control Systems» more  CDC 2008»
14 years 1 months ago
Robust limit cycle control in an attitude control system with switching-constrained actuators
Abstract— In this paper the robust behavior in some piecewise affine systems with minimally spaced transition times is studied. Such systems are found e.g. in satellites and sat...
Alexandre R. Mesquita, Karl Heinz Kienitz, Erico L...
MICRO
1997
IEEE
127views Hardware» more  MICRO 1997»
13 years 11 months ago
Exploiting Dead Value Information
We describe Dead Value Information (DVI) and introduce three new optimizations which exploit it. DVI provides assertions that certain register values are dead, meaning they will n...
Milo M. K. Martin, Amir Roth, Charles N. Fischer