Sciweavers

293 search results - page 58 / 59
» Multiple Target Localization Using Compressive Sensing
Sort
View
MICRO
2008
IEEE
131views Hardware» more  MICRO 2008»
14 years 4 months ago
Token flow control
As companies move towards many-core chips, an efficient onchip communication fabric to connect these cores assumes critical importance. To address limitations to wire delay scala...
Amit Kumar 0002, Li-Shiuan Peh, Niraj K. Jha
SIGCOMM
2010
ACM
13 years 10 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
BMCBI
2010
104views more  BMCBI 2010»
13 years 10 months ago
Parameters for accurate genome alignment
Background: Genome sequence alignments form the basis of much research. Genome alignment depends on various mundane but critical choices, such as how to mask repeats and which sco...
Martin C. Frith, Michiaki Hamada, Paul Horton
LCTRTS
2009
Springer
14 years 4 months ago
Eliminating the call stack to save RAM
Most programming languages support a call stack in the programming model and also in the runtime system. We show that for applications targeting low-power embedded microcontroller...
Xuejun Yang, Nathan Cooprider, John Regehr
HIPEAC
2007
Springer
14 years 4 months ago
Dynamic Capacity-Speed Tradeoffs in SMT Processor Caches
Caches are designed to provide the best tradeoff between access speed and capacity for a set of target applications. Unfortunately, different applications, and even different phas...
Sonia López, Steve Dropsho, David H. Albone...