Sciweavers

1249 search results - page 172 / 250
» Limitations of the Even-Mansour Construction
Sort
View
DSD
2002
IEEE
90views Hardware» more  DSD 2002»
14 years 2 months ago
Simplifying Instruction Issue Logic in Superscalar Processors
Modern microprocessors schedule instructions dynamically in order to exploit instruction-level parallelism. It is necessary to increase instruction window size for improving instr...
Toshinori Sato, Itsujiro Arita
ISSRE
2002
IEEE
14 years 2 months ago
Fault Contribution Trees for Product Families
Software Fault Tree Analysis (SFTA) provides a structured way to reason about the safety or reliability of a software system. As such, SFTA is widely used in missioncritical appli...
Dingding Lu, Robyn R. Lutz
ITCC
2002
IEEE
14 years 2 months ago
Taxonomy-based Adaptive Web Search Method
Current crawler-based search engines usually return a long list of search results containing a lot of noise documents. By indexing collected documents on topic path in taxonomy, t...
Said Mirza Pahlevi, Hiroyuki Kitagawa
CDC
2009
IEEE
149views Control Systems» more  CDC 2009»
14 years 2 months ago
Robust stabilization of model-based uncertain singularly perturbed systems with networked time-delay
—In this paper, a robust stabilization of the uncertain singularly perturbed system via a networked state feedback with the transmission time-delay is addressed. Taking its nomin...
Zhiming Wang, Wei Liu, Haohui Dai, D. Subbaram Nai...
SPAA
2009
ACM
14 years 2 months ago
Brief announcement: a lower bound for depth-restricted work stealing
Work stealing is a common technique used in the runtime schedulers of parallel languages such as Cilk and parallel libraries such as Intel Threading Building Blocks (TBB). Depth-r...
Jim Sukha