Sciweavers

1558 search results - page 238 / 312
» Scalable work stealing
Sort
View
ICCAD
2010
IEEE
108views Hardware» more  ICCAD 2010»
13 years 6 months ago
Mathematical yield estimation for two-dimensional-redundancy memory arrays
Defect repair has become a necessary process to enhance the overall yield for memories since manufacturing a natural good memory is difficult in current memory technologies. This ...
Mango Chia-Tso Chao, Ching-Yu Chin, Chen-Wei Lin
ADHOCNETS
2010
Springer
13 years 5 months ago
Guaranteeing Reliable Communications in Mesh Beacon-Enabled IEEE802.15.4 WSN for Industrial Monitoring Applications
Wireless Sensor Networks (WSN) are a very promising solution for industrial monitoring applications in terms of safety, costs, efficiency and productivity. However, in order to mov...
Berta Carballido Villaverde, Susan Rea, Dirk Pesch
CVPR
2011
IEEE
13 years 4 months ago
Learning Message-Passing Inference Machines for Structured Prediction
Nearly every structured prediction problem in computer vision requires approximate inference due to large and complex dependencies among output labels. While graphical models prov...
Stephane Ross, Daniel Munoz, J. Andrew Bagnell
CVPR
2011
IEEE
13 years 4 months ago
Hierarchical Semantic Indexing for Large Scale Image Retrieval
This paper addresses the problem of similar image retrieval, especially in the setting of large-scale datasets with millions to billions of images. The core novel contribution is ...
Jia Deng, Alexander Berg, Li Fei-Fei
JSAC
2010
170views more  JSAC 2010»
13 years 3 months ago
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. I...
Christina Pöpper, Mario Strasser, Srdjan Capk...