Sciweavers

314 search results - page 6 / 63
» Practical Techniques for Performance Estimation of Processor...
Sort
View
CONCURRENCY
2007
158views more  CONCURRENCY 2007»
13 years 7 months ago
Collective communication: theory, practice, and experience
We discuss the design and high-performance implementation of collective communications operations on distributed-memory computer architectures. Using a combination of known techni...
Ernie Chan, Marcel Heimlich, Avi Purkayastha, Robe...
ICASSP
2011
IEEE
12 years 11 months ago
A robust estimator and detector of circularity of complex signals
Recent research has revealed that circularity (or, propriety) of complex random signals can be exploited in developing optimal signal processors. In this paper, a robust estimator...
Esa Ollila, Visa Koivunen, H. Vincent Poor
LCTRTS
2010
Springer
14 years 8 days ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
LR
2011
170views more  LR 2011»
13 years 2 months ago
Routing automated guided vehicles in container terminals through the Q-learning technique
This paper suggests a routing method for automated guided vehicles in port terminals that uses the Q-learning technique. One of the most important issues for the efficient operati...
Su Min Jeon, Kap Hwan Kim, Herbert Kopfer
ISLPED
2004
ACM
122views Hardware» more  ISLPED 2004»
14 years 28 days ago
Microarchitectural techniques for power gating of execution units
Leakage power is a major concern in current and future microprocessor designs. In this paper, we explore the potential of architectural techniques to reduce leakage through power-...
Zhigang Hu, Alper Buyuktosunoglu, Viji Srinivasan,...