Results 1 - 10
of
120
RICE UNIVERSITY Regime Change: Sampling Rate vs. Bit-Depth in Compressive Sensing
, 2011
"... The compressive sensing (CS) framework aims to ease the burden on analog-to-digital converters (ADCs) by exploiting inherent structure in natural and man-made signals. It has been demon-strated that structured signals can be acquired with just a small number of linear measurements, on the order of t ..."
Abstract
- Add to MetaCart
The compressive sensing (CS) framework aims to ease the burden on analog-to-digital converters (ADCs) by exploiting inherent structure in natural and man-made signals. It has been demon-strated that structured signals can be acquired with just a small number of linear measurements, on the order
Design and Implementation of the Berkeley Virtual Memory Extensions to the UNIX † Operating System‡
, 2004
"... This paper describes a modified version of the UNIX operating system that supports virtual memory through demand paging. The particular implementation being described here is specific to the VAX*-11/780 computer system although most of the design decisions have wider applicability. The modified syst ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
included are measurement results comparing the virtual system performance to the swap-based system performance under a script-driven load.
De-indirection for Flash-based Solid State Drives
, 2013
"... ii iv vTo my parents vi vii Acknowledgements I would first and foremost extend my whole-hearted gratitude to my advisors, An-drea Arpaci-Dusseau and Remzi Arpaci-Dusseau. Andrea and Remzi are the reason that I had the opportunity for this exceptional Ph.D. journey. To this day, I still re-member the ..."
Abstract
- Add to MetaCart
-member the moment when they took me as their student and the joy and hope in my heart. Andrea and Remzi have showed me what systems research is like and how much fun and challenging it can be. Before this journey with them, I had always liked and believed in the beauty of mathematics and theory. My initial interest
A Study of User-Friendly Hash Comparison Schemes
"... Abstract—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans may make a mistake or require significant time and patience to accurately compare the hash values. To improve usab ..."
Abstract
- Add to MetaCart
Abstract—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans may make a mistake or require significant time and patience to accurately compare the hash values. To improve
Recommended Citation
, 2007
"... Radio power management is of paramount concern in wireless sensor networks that must achieve long lifetimes on scarce amounts of energy. While a multitude of power management protocols have been proposed in the past, the lack of system support for flexibly integrating them with a diverse set of appl ..."
Abstract
- Add to MetaCart
Radio power management is of paramount concern in wireless sensor networks that must achieve long lifetimes on scarce amounts of energy. While a multitude of power management protocols have been proposed in the past, the lack of system support for flexibly integrating them with a diverse set
Results 1 - 10
of
120