Sciweavers

17018 search results - page 3349 / 3404
» From the How to the What
Sort
View
TWC
2008
159views more  TWC 2008»
13 years 9 months ago
Resource allocation for spectrum underlay in cognitive radio networks
A resource allocation framework is presented for spectrum underlay in cognitive radio networks. We consider both interference constraints for primary users and quality of service (...
Long Bao Le, Ekram Hossain
VLSISP
2008
173views more  VLSISP 2008»
13 years 9 months ago
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors
Advanced bit manipulation operations are not efficiently supported by commodity word-oriented microprocessors. Programming tricks are typically devised to shorten the long sequence...
Yedidya Hilewitz, Ruby B. Lee
ALGORITHMICA
2002
103views more  ALGORITHMICA 2002»
13 years 9 months ago
Efficient Bulk Operations on Dynamic R-Trees
In recent years there has been an upsurge of interest in spatial databases. A major issue is how to manipulate efficiently massive amounts of spatial data stored on disk in multidi...
Lars Arge, Klaus Hinrichs, Jan Vahrenhold, Jeffrey...
MAM
2007
157views more  MAM 2007»
13 years 9 months ago
Executing large algorithms on low-capacity FPGAs using flowpath partitioning and runtime reconfiguration
This paper describes a new method of executing a software program on an FPGA for embedded systems. Rather than combine reconfigurable logic with a microprocessor core, this method...
Darrin M. Hanna, Michael DuChene
MANSCI
2007
85views more  MANSCI 2007»
13 years 9 months ago
Probability Elicitation, Scoring Rules, and Competition Among Forecasters
Probability forecasters who are rewarded via a proper scoring rule may care not only about the score, but also about their performance relative to other forecasters. We model this...
Kenneth C. Lichtendahl Jr., Robert L. Winkler
« Prev « First page 3349 / 3404 Last » Next »