Sciweavers

969 search results - page 84 / 194
» Generalized matching from theory to application
Sort
View
MICRO
2003
IEEE
95views Hardware» more  MICRO 2003»
14 years 2 months ago
Processor Acceleration Through Automated Instruction Set Customization
Application-specific extensions to the computational capabilities of a processor provide an efficient mechanism to meet the growing performance and power demands of embedded appl...
Nathan Clark, Hongtao Zhong, Scott A. Mahlke
IUI
2004
ACM
14 years 2 months ago
Second messenger: increasing the visibility of minority viewpoints with a face-to-face collaboration tool
This paper introduces the application Second Messenger, a tool for supporting face-to-face meetings and discussions. Second Messenger uses a speech-recognition engine as an input ...
Joan Morris DiMicco, Walter Bender
UAI
2001
13 years 10 months ago
Iterative Markov Chain Monte Carlo Computation of Reference Priors and Minimax Risk
We present an iterative Markov chain Monte Carlo algorithm for computing reference priors and minimax risk for general parametric families. Our approach uses MCMC techniques based...
John D. Lafferty, Larry A. Wasserman
ALGORITHMICA
2010
154views more  ALGORITHMICA 2010»
13 years 9 months ago
On the Convergence of Multicast Games in Directed Networks
We investigate the convergence of the price of anarchy after a limited number of moves in the classical multicast communication game when the underlying communication networks is ...
Angelo Fanelli, Michele Flammini, Luca Moscardelli
ACMSE
2009
ACM
14 years 3 months ago
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting
In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are be...
J. Lane Thames, Randal Abler, David Keeling