Exploració per títol
Ara es mostren els items 104389-104408 de 245897
-
Exploiting transmission spatial diversity in frequency selective systems with feedback channel
(2003)
Text en actes de congrés
Accés obertIn this paper we address the design of a multiple transmit antenna system in which the Channel State Information (CSI) at the transmitter is not perfect. Two different approaches are analyzed one based on the Minimization ... -
Exploiting a dosage model to enhance Photo-Fenton process performance
(2024-03)
Article
Accés obertThe performance of Photo-Fenton treatments is reported to heavily rely on how hydrogen peroxide is supplied. Rigorously optimizing the dosage profile of hydrogen profile is a challenge that has been hardly addressed. ... -
Exploiting a new level of DLP in multimedia applications
(Institute of Electrical and Electronics Engineers (IEEE), 1999)
Text en actes de congrés
Accés obertThis paper proposes and evaluates MOM: a novel ISA paradigm targeted at multimedia applications. By fusing conventional vector ISA approaches together with more recent SIMD-like (Single Instruction Multiple Data) ISAs (such ... -
Exploiting asymmetric multi-core systems with flexible system software
(Universitat Politècnica de Catalunya, 2018-11-21)
Tesi
Accés obertAsymmetric multi-cores (AMCs) are a successful architectural solution for both mobile devices and supercomputers. These architectures combine different types of processing cores designed at different performance and power ... -
Exploiting asynchrony from exact forward recovery for DUE in iterative solvers
(Association for Computing Machinery (ACM), 2015)
Text en actes de congrés
Accés obertThis paper presents a method to protect iterative solvers from Detected and Uncorrected Errors (DUE) relying on error detection techniques already available in commodity hardware. Detection operates at the memory page ... -
Exploiting asynchrony from exact forward recovery for DUE in iterative solvers
(2015)
Report de recerca
Accés obertThis paper presents a method to protect iterative solvers from Detected and Uncorrected Errors (DUE) relying on error detection techniques already available in commodity hardware. Detection operates at the memory page ... -
Exploiting cognition for energy and spectrum efficient wireless networks
(Universitat Politècnica de Catalunya, 2015-11-09)
Tesi
Accés obertThe main objective of this thesis is to propose and evaluate medium access layer algorithms, that will exploit different types of cognition to provide energy and spectrum efficiency enhancement. In particular, two main ... -
Exploiting cognitive management for supporting multimedia applications in cognitive radio networks
(CRC Press Taylor & Francis Group, 2014-12)
Capítol de llibre
Accés restringit per política de l'editorial -
Exploiting consistency maintenance for planning
(Universitat Politècnica de Catalunya. Departament de Llenguatges i Sistemes Informàtics, 1993)
Text en actes de congrés
Accés obertA planning problem mainly consists of a description of an initial world, a set of formulas which declaratively define a goal world and a set of operator specifications which can be used to derive new worlds from given ... -
Exploiting cyclodextrins as artificial chaperones to enhance enzyme protection through supramolecular engineering
(Royal Society of Chemistry, 2024)
Article
Accés obertWe report a method of enzyme stabilisation exploiting the artificial protein chaperone properties of β-cyclodextrin (β-CD) covalently embedded in an ultrathin organosilica layer. Putative interaction points of this artificial ... -
Exploiting data locality in cache-coherent NUMA systems
(Universitat Politècnica de Catalunya, 2022-04-06)
Tesi
Accés obertThe end of Dennard scaling has caused a stagnation of the clock frequency in computers.To overcome this issue, in the last two decades vendors have been integrating larger numbers of processing elements in the systems, ... -
Exploiting different levels of parallelism in the biological sequence comparison problem
(2009-04-23)
Text en actes de congrés
Accés obertIn the last years the fast growth of bioinformatics field has atracted the attention of computer scientists. At the same time, de exponential growth of databases that contains biological information (such as protein and ... -
Exploiting dimensionality and defect mitigation to create tunable microwave dielectrics
(2013-10)
Article
Accés restringit per política de l'editorialThe miniaturization and integration of frequency-agile microwave circuits-relevant to electronically tunable filters, antennas, resonators and phase shifters-with microelectronics offers tantalizing device possibilities, ... -
Exploiting distributional semantics for content-based and context-aware recommendation
(Universitat Politècnica de Catalunya, 2014-06-13)
Tesi
Accés obertDuring the last decade, the use of recommender systems has been increasingly growing to the point that, nowadays, the success of many well-known services depends on these technologies. Recommenders Systems help people to ... -
Exploiting diversity of margin-based classifiers
(2003-12)
Report de recerca
Accés obertAn experimental comparison among Support Vector Machines, AdaBoost and a recently proposed model for maximizing the margin with Feed-forward Neural Networks has been made on a real-world classification problem, namely ... -
Exploiting frame coherence in real-time rendering for energy-efficient GPUs
(Universitat Politècnica de Catalunya, 2020-06-09)
Tesi
Accés obertThe computation capabilities of mobile GPUs have greatly evolved in the last generations, allowing real-time rendering of realistic scenes. However, the desire for processing complex environments clashes with the ... -
Exploiting instruction-and data-level parallelism
(1997-09)
Article
Accés obertSimultaneous multithreaded vector architectures combine the best of data-level and instruction-level parallelism and perform better than either approach could separately. Our design achieves performance equivalent to ... -
Exploiting kernel compression on BNNs
(Institute of Electrical and Electronics Engineers (IEEE), 2023)
Text en actes de congrés
Accés obertBinary Neural Networks (BNNs) are showing tremen-dous success on realistic image classification tasks. Notably, their accuracy is similar to the state-of-the-art accuracy obtained by full-precision models tailored to edge ... -
Exploiting key-value data stores scalability for HPC
(Institute of Electrical and Electronics Engineers (IEEE), 2017)
Text en actes de congrés
Accés obertBigData revolutionised the IT industry. It first interested the OLTP systems. Distributed Hash Tables replaced Traditional SQL databases as they guaranteed low response time on simple read/write requests. The second wave ... -
Exploiting knowledge management for supporting multi-band spectrum selection in non-stationary environments
(2013-12)
Article
Accés restringit per política de l'editorialThis paper proposes a new knowledge management framework for spectrum selection under non-stationary conditions supporting a set of applications with heterogeneous requirements. In this respect, an optimization problem is ...