Sciweavers

9532 search results - page 1745 / 1907
» Logic, Graphs, and Algorithms
Sort
View
IEEEPACT
2008
IEEE
15 years 10 months ago
Exploiting loop-dependent stream reuse for stream processors
The memory access limits the performance of stream processors. By exploiting the reuse of data held in the Stream Register File (SRF), an on-chip storage, the number of memory acc...
Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers,...
SCAM
2008
IEEE
15 years 10 months ago
Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software
Aspect-Oriented Programming (AOP) strives to localize the scattered and tangled implementations of crosscutting concerns (CCCs) by allowing developers to declare that certain acti...
Raffi Khatchadourian, Awais Rashid
CIDM
2007
IEEE
15 years 10 months ago
Prediction of Abnormal Behaviors for Intelligent Video Surveillance Systems
–The OBSERVER is a video surveillance system that detects and predicts abnormal behaviors aiming at the intelligent surveillance concept. The system acquires color images from a ...
Duarte Duque, Henrique Santos, Paulo Cortez
DATE
2007
IEEE
85views Hardware» more  DATE 2007»
15 years 10 months ago
QuteSAT: a robust circuit-based SAT solver for complex circuit structure
We propose a robust circuit-based Boolean Satisfiability (SAT) solver, QuteSAT, that can be applied to complex circuit netlist structure. Several novel techniques are proposed in ...
Chi-An Wu, Ting-Hao Lin, Chih-Chun Lee, Chung-Yang...
164
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
End-to-End Throughput-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks
— 1 Wireless mesh networks are deployed as broadband backbones to provide ubiquitous wireless access for residents and local businesses. Utilizing multiple channels has the poten...
Fei Ye, Qing Chen, Zhisheng Niu
« Prev « First page 1745 / 1907 Last » Next »