Sciweavers

225 search results - page 8 / 45
» Retargetable binary utilities
Sort
View
VLSISP
2008
159views more  VLSISP 2008»
13 years 7 months ago
Effective Code Generation for Distributed and Ping-Pong Register Files: A Case Study on PAC VLIW DSP Cores
The compiler is generally regarded as the most important software component that supports a processor design to achieve success. This paper describes our application of the open re...
Yung-Chia Lin, Chia-Han Lu, Chung-Ju Wu, Chung-Lin...
ICASSP
2008
IEEE
14 years 2 months ago
Maximum likelihood binary detection in improper complex gaussian noise
In a wide range of communication systems, including DS-CDMA and OFDM systems, the signal-of-interest might be corrupted by an improper [1] (also called non circularly symmetric [2...
Amirhossein S. Aghaei, Konstantinos N. Plataniotis...
DCC
2002
IEEE
14 years 15 days ago
Data Compression of Correlated Non-Binary Sources Using Punctured Turbo Codes
We consider the case of two corr elated non-binary sources. Data compression is achieved by transforming the sequences of non-binary symbols into sequences of bits and then using ...
Ying Zhao, Javier Garcia-Frias
MICRO
2000
IEEE
162views Hardware» more  MICRO 2000»
13 years 11 months ago
Accurate and efficient predicate analysis with binary decision diagrams
Functionality and performance of EPIC architectural features depend on extensive compiler support. Predication, one of these features, promises to reduce control flow overhead and...
John W. Sias, Wen-mei W. Hwu, David I. August
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 7 months ago
Mining The Successful Binary Combinations: Methodology and A Simple Case Study
The importance of finding the characteristics leading to either a success or a failure is one of the driving forces of data mining. The various application areas of finding succes...
Yuval Cohen