Sciweavers

1898 search results - page 345 / 380
» Weak Keys for IDEA
Sort
View
DATE
2010
IEEE
193views Hardware» more  DATE 2010»
14 years 1 months ago
Coordinated resource optimization in behavioral synthesis
Abstract—Reducing resource usage is one of the most important optimization objectives in behavioral synthesis due to its direct impact on power, performance and cost. The datapat...
Jason Cong, Bin Liu, Junjuan Xu
ISCA
2010
IEEE
181views Hardware» more  ISCA 2010»
14 years 1 months ago
ColorSafe: architectural support for debugging and dynamically avoiding multi-variable atomicity violations
In this paper, we propose ColorSafe, an architecture that detects and dynamically avoids single- and multi-variable atomicity violation bugs. The key idea is to group related data...
Brandon Lucia, Luis Ceze, Karin Strauss
FOCS
2002
IEEE
14 years 1 months ago
Low-Dimensional Linear Programming with Violations
Two decades ago, Megiddo and Dyer showed that linear programming in two and three dimensions (and subsequently any constant number of dimensions) can be solved in linear time. In ...
Timothy M. Chan
ICNP
2002
IEEE
14 years 1 months ago
Using Adaptive Rate Estimation to Provide Enhanced and Robust Transport over Heterogeneous Networks
The rapid advancement in wireless communication technology has spurred significant interest in the design and development of enhanced TCP protocols. Among them, TCP Westwood (TCPW...
Ren Wang, Massimo Valla, M. Y. Sanadidi, Mario Ger...
WECWIS
2002
IEEE
136views ECommerce» more  WECWIS 2002»
14 years 1 months ago
XML-based Advanced UDDI Search Mechanism for B2B Integration
Exploring an appropriate business application published as a Web Service in the UDDI registry is a critical issue. Search for such an application should be effective in terms of t...
Liang-Jie Zhang, Haifei Li, Henry Chang, Tian Chao