Sciweavers

130 search results - page 9 / 26
» Finding and Certifying Loops
Sort
View
ICRA
2002
IEEE
78views Robotics» more  ICRA 2002»
13 years 12 months ago
Mobility Analysis of Planar Mobile Robots
: In this paper, mobility analysis of various planar mobile robots are performed. Two different approaches are employed for that purpose. In the first approach, joint screws are em...
Whee Kuk Kim, Seung-Eun Lee, Byung-Ju Yi
CLUSTER
2004
IEEE
13 years 10 months ago
Predicting memory-access cost based on data-access patterns
Improving memory performance at software level is more effective in reducing the rapidly expanding gap between processor and memory performance. Loop transformations (e.g. loop un...
Surendra Byna, Xian-He Sun, William Gropp, Rajeev ...
CC
2008
Springer
193views System Software» more  CC 2008»
13 years 9 months ago
Automatic Transformations for Communication-Minimized Parallelization and Locality Optimization in the Polyhedral Model
The polyhedral model provides powerful abstractions to optimize loop nests with regular accesses. Affine transformations in this model capture a complex sequence of execution-reord...
Uday Bondhugula, Muthu Manikandan Baskaran, Sriram...
PLDI
2010
ACM
14 years 4 months ago
The Reachability-Bound Problem
We define the reachability-bound problem to be the problem of finding a symbolic worst-case bound on the number of times a given control location inside a procedure is visited in ...
Sumit Gulwani, Florian Zuleger
MVA
2007
137views Computer Vision» more  MVA 2007»
13 years 8 months ago
Fingerprint Core and Delta Detection by Candidate Analysis
This paper presents a new reliable detection of core and delta in fingerprints by candidate analysis. The line search based method, which is one of the reliable approaches to dete...
Tomohiko Ohtsuka, Daisuke Watanabe, Hiroyuki Aoki