Sciweavers

1474 search results - page 212 / 295
» Exploiting Locality in a TMS
Sort
View
MICRO
2000
IEEE
80views Hardware» more  MICRO 2000»
14 years 2 months ago
Silent stores for free
Silent store instructions write values that exactly match the values that are already stored at the memory address that is being written. A recent study reveals that significant ...
Kevin M. Lepak, Mikko H. Lipasti
ECCV
2010
Springer
14 years 2 months ago
Efficient Inference with Multiple Heterogeneous Part Detectors for Human Pose Estimation
We address the problem of estimating human pose in a single image using a part based approach. Pose accuracy is directly affected by the accuracy of the part detectors but more acc...
DIALM
1999
ACM
127views Algorithms» more  DIALM 1999»
14 years 2 months ago
The performance of query control schemes for the zone routing protocol
—In this paper, we study the performance of route query control mechanisms for the Zone Routing Protocol (ZRP) for ad hoc networks. ZRP proactively maintains routing information ...
Zygmunt J. Haas, Marc R. Pearlman
DEXAW
1999
IEEE
152views Database» more  DEXAW 1999»
14 years 2 months ago
Advanced Metrics for Class-Driven Similarity Search
This paper presents two metrics for the Nearest Neighbor Classifier that share the property of being adapted, i.e. learned, on a set of data. Both metrics can be used for similari...
Paolo Avesani, Enrico Blanzieri, Francesco Ricci
ICPP
1999
IEEE
14 years 2 months ago
Compiler Optimizations for I/O-Intensive Computations
This paper describes transformation techniques for out-of-core programs (i.e., those that deal with very large quantities of data) based on exploiting locality using a combination...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...