Sciweavers

8731 search results - page 1700 / 1747
» Interaction design in the wild
Sort
View
VLDB
1999
ACM
145views Database» more  VLDB 1999»
14 years 1 months ago
DBMSs on a Modern Processor: Where Does Time Go?
Recent high-performance processors employ sophisticated techniques to overlap and simultaneously execute multiple computation and memory operations. Intuitively, these techniques ...
Anastassia Ailamaki, David J. DeWitt, Mark D. Hill...
VISUALIZATION
1998
IEEE
14 years 1 months ago
Building perceptual textures to visualize multidimensional datasets
This paper presents a new method for using texture to visualize multidimensional data elements arranged on an underlying threedimensional height field. We hope to use simple textu...
Christopher G. Healey, James T. Enns
VISUALIZATION
1998
IEEE
14 years 1 months ago
Extremal feature extraction from 3-D vector and noisy scalar fields
We are interested in feature extraction from volume data in terms of coherent surfaces and 3-D space curves. The input can be an inaccurate scalar or vector field, sampled densely...
Chi-Keung Tang, Gérard G. Medioni
DAC
1998
ACM
14 years 1 months ago
Synthesis of Power-Optimized and Area-Optimized Circuits from Hierarchical Behavioral Descriptions
We present a technique for synthesizing power- as well as area-optimized circuits from hierarchical data flow graphs under throughput constraints. We allow for the use of complex...
Ganesh Lakshminarayana, Niraj K. Jha
CAV
1998
Springer
175views Hardware» more  CAV 1998»
14 years 1 months ago
An ACL2 Proof of Write Invalidate Cache Coherence
As a pedagogical exercise in ACL2, we formalize and prove the correctness of a write invalidate cache scheme. In our formalization, an arbitrary number of processors, each with its...
J. Strother Moore
« Prev « First page 1700 / 1747 Last » Next »