Sciweavers

352 search results - page 43 / 71
» Quantifying Instruction Criticality
Sort
View
CF
2005
ACM
13 years 11 months ago
An efficient wakeup design for energy reduction in high-performance superscalar processors
In modern superscalar processors, the complex instruction scheduler could form the critical path of the pipeline stages and limit the clock cycle time. In addition, complex schedu...
Kuo-Su Hsiao, Chung-Ho Chen
DATE
2008
IEEE
113views Hardware» more  DATE 2008»
14 years 4 months ago
Compositional, dynamic cache management for embedded chip multiprocessors
This paper proposes a dynamic cache repartitioning technique that enhances compositionality on platforms executing media applications with multiple utilization scenarios. The repa...
Anca Mariana Molnos, Marc J. M. Heijligers, Sorin ...
ECCV
2004
Springer
14 years 11 months ago
Detecting Keypoints with Stable Position, Orientation, and Scale under Illumination Changes
Local feature approaches to vision geometry and object recognition are based on selecting and matching sparse sets of visually salient image points, known as `keypoints' or `p...
Bill Triggs
ICIP
2007
IEEE
14 years 11 months ago
Skeleton-Based Tornado Hook Echo Detection
We propose and evaluate a method to identify tornadoes automatically in Doppler radar imagery by detecting hook echoes, which are important signatures of tornadoes, in Doppler rad...
Hongkai Wang, Robert E. Mercer, John L. Barron, Pa...
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
14 years 11 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal