Browsing by Keywords "Application programs"
Now showing items 1-7 of 7
-
AutopaR: An Automatic Parallelization Tool for Recursive Calls
(IEEE, 2014-09)Manycore systems are becoming more and more powerful with the integration of hundreds of cores on a single chip. However, writing parallel programs on these manycore systems has become a problem since the amount of available ... -
Effects of color pairs on warmth perception in interiors
(Society for Imaging Science and Technology, 2016-09)Warmth perception is a physical, emotional, semantic, and sensorial bond between people and their environments. Although the effects of single colors have been explored, there has been no research on how paired colors ... -
Memory effect by charging of ultra‐small 2‐nm laser‐synthesized solution processable Si‐nanoparticles embedded in Si–Al2O3–SiO2 structure
(Wiley-VCH Verlag, 2015)A memory structure containing ultra-small 2-nm laser-synthesized silicon nanoparticles is demonstrated. The Si-nanoparticles are embedded between an atomic layer deposited high-κ dielectric Al<inf>2</inf>O<inf>3</inf> layer ... -
Pipelined fission for stream programs with dynamic selectivity and partitioned state
(Academic Press, 2016)There is an ever increasing rate of digital information available in the form of online data streams. In many application domains, high throughput processing of such data is a critical requirement for keeping up with the ... -
A robotic software for intelligent applications
(2013)This study addresses the development of a novel intelligent robotic software system which can control a low-cost five DOF robotic arm and allows the robot to be able to play Tic-Tac-Toe, a simple board game. The paper first ... -
SPM management using markov chain based data access prediction
(IEEE, 2008-11)Leveraging the power of scratchpad memories (SPMs) available in most embedded systems today is crucial to extract maximum performance from application programs. While regular accesses like scalar values and array expressions ... -
A survey on information security threats and solutions for Machine to Machine (M2M) communications
(Academic Press Inc., 2017)Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, ...