Sciweavers

5344 search results - page 97 / 1069
» Privacy-Preserving Set Operations
Sort
View
151
Voted
ASPLOS
2000
ACM
15 years 6 months ago
An Analysis of Operating System Behavior on a Simultaneous Multithreaded Architecture
This paper presents the first analysis of operating system execution on a simultaneous multithreaded (SMT) processor. While SMT has been studied extensively over the past 6 years,...
Joshua Redstone, Susan J. Eggers, Henry M. Levy
GECCO
2008
Springer
239views Optimization» more  GECCO 2008»
15 years 3 months ago
Multiobjective design of operators that detect points of interest in images
In this paper, a multiobjective (MO) learning approach to image feature extraction is described, where Pareto-optimal interest point (IP) detectors are synthesized using genetic p...
Leonardo Trujillo, Gustavo Olague, Evelyne Lutton,...
139
Voted
IJRR
2008
139views more  IJRR 2008»
15 years 2 months ago
Learning to Control in Operational Space
One of the most general frameworks for phrasing control problems for complex, redundant robots is operational space control. However, while this framework is of essential importan...
Jan Peters, Stefan Schaal
PLDI
2012
ACM
13 years 4 months ago
Effective parallelization of loops in the presence of I/O operations
Software-based thread-level parallelization has been widely studied for exploiting data parallelism in purely computational loops to improve program performance on multiprocessors...
Min Feng, Rajiv Gupta, Iulian Neamtiu
ICS
2005
Tsinghua U.
15 years 8 months ago
The implications of working set analysis on supercomputing memory hierarchy design
Supercomputer architects strive to maximize the performance of scientific applications. Unfortunately, the large, unwieldy nature of most scientific applications has lead to the...
Richard C. Murphy, Arun Rodrigues, Peter M. Kogge,...