Sciweavers

1528 search results - page 146 / 306
» Performance Assertion Checking
Sort
View
133
Voted
ISITA
2010
14 years 9 months ago
Optimality of LDGM-LDPC compound codes for lossy compression of binary erasure source
We consider the Binary Erasure Source (BES) introduced by Martinian and Yedidia. Based on the technique introduced by Martinian and Wainwright, we upper bound the rate-distortion p...
Gregory Demay, Vishwambhar Rathi, Lars K. Rasmusse...
113
Voted
JUCS
2010
82views more  JUCS 2010»
14 years 9 months ago
The Separation of Relativized Versions of P and DNP for the Ring of the Reals
: We consider the uniform BSS model of computation where the machines can perform additions, multiplications, and tests of the form x 0. The oracle machines can also check whether...
Christine Gaßner
ISCA
2005
IEEE
117views Hardware» more  ISCA 2005»
15 years 8 months ago
Store Vulnerability Window (SVW): Re-Execution Filtering for Enhanced Load Optimization
The load-store unit is a performance critical component of a dynamically-scheduled processor. It is also a complex and non-scalable component. Several recently proposed techniques...
Amir Roth
135
Voted
EMSOFT
2006
Springer
15 years 6 months ago
Reliability mechanisms for file systems using non-volatile memory as a metadata store
Portable systems such as cell phones and portable media players commonly use non-volatile RAM (NVRAM) to hold all of their data and metadata, and larger systems can store metadata...
Kevin M. Greenan, Ethan L. Miller
113
Voted
DAC
2006
ACM
16 years 3 months ago
Design tools for reliability analysis
Recent progress in EDA tools allows IC designs to be accurately verified with consequent improvements in yield and performance through reduced guard bands. This paper will present...
Zhihong Liu, Bruce McGaughy, James Z. Ma