Sciweavers

2168 search results - page 106 / 434
» Using Approximation Hardness to Achieve Dependable Computati...
Sort
View
127
Voted
VLSID
2002
IEEE
130views VLSI» more  VLSID 2002»
16 years 4 months ago
Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks
In preemptive real-time systems, a tighter estimate of the Worst Case Response Time(WCRT) of the tasks can be obtained if the layout of the tasks in memory is included in the esti...
Anupam Datta, Sidharth Choudhury, Anupam Basu
164
Voted
TASLP
2011
14 years 10 months ago
Source-Filter-Based Single-Channel Speech Separation Using Pitch Information
—In this paper, we investigate the source–filter-based approach for single-channel speech separation. We incorporate source-driven aspects by multi-pitch estimation in the mod...
Michael Stark, Michael Wohlmayr, Franz Pernkopf
265
Voted
ICS
2011
Tsinghua U.
14 years 7 months ago
Hystor: making the best use of solid state drives in high performance storage systems
With the fast technical improvement, flash memory based Solid State Drives (SSDs) are becoming an important part of the computer storage hierarchy to significantly improve perfo...
Feng Chen, David A. Koufaty, Xiaodong Zhang
145
Voted
FOCS
2009
IEEE
15 years 10 months ago
The Complexity of Rationalizing Network Formation
— We study the complexity of rationalizing network formation. In this problem we fix an underlying model describing how selfish parties (the vertices) produce a graph by making...
Shankar Kalyanaraman, Christopher Umans
148
Voted
IPPS
2009
IEEE
15 years 10 months ago
Using hardware transactional memory for data race detection
Abstract—Widespread emergence of multicore processors will spur development of parallel applications, exposing programmers to degrees of hardware concurrency hitherto unavailable...
Shantanu Gupta, Florin Sultan, Srihari Cadambi, Fr...