Sciweavers

151 search results - page 10 / 31
» How the JSDL can Exploit the Parallelism
Sort
View
139
Voted
ICDCS
2009
IEEE
15 years 1 months ago
TBD: Trajectory-Based Data Forwarding for Light-Traffic Vehicular Networks
This paper proposes a Trajectory-Based Data Forwarding (TBD) scheme, tailored for the data forwarding in lighttraffic vehicular ad-hoc networks. State-of-the-art schemes have demo...
Jaehoon Jeong, Shuo Guo, Yu Gu, Tian He, David Du
142
Voted
ISPAN
1997
IEEE
15 years 8 months ago
A Parallel Pipelined Renderer for Time-Varying Volume Data
This paper presents a strategy for efficiently rendering time-varying volume data on a distributed-memory parallel computer. Visualizing time-varying volume data take both large s...
Tzi-cker Chiueh, Kwan-Liu Ma
128
Voted
ICPP
2005
IEEE
15 years 9 months ago
Incremental Parallelization Using Navigational Programming: A Case Study
We show how a series of transformations can be applied to a sequential program to obtain programs that represent successive steps in exploiting parallelism in the original algorit...
Lei Pan, Wenhui Zhang, Arthur Asuncion, Ming Kin L...
115
Voted
WCRE
2002
IEEE
15 years 8 months ago
Exposing Data-Level Parallelism in Sequential Image Processing Algorithms
As new computer architectures are developed to exploit large-scale data-level parallelism, techniques are needed to retarget legacy sequential code to these platforms. Sequential ...
Lewis B. Baumstark Jr., Linda M. Wills
128
Voted
IPCV
2007
15 years 5 months ago
Use of Paraplanar Constraint for Parallel Inspection of Wafer Bump Heights
- The shrunk dimension of electronic devices leads to more stringent requirement on process control and quality assurance of their fabrication. For instance, direct die-to-die bond...
Mei Dong, Ronald Chung, Edmund Y. Lam, Kenneth S. ...