D. Harris

Learn More
Accurate clock skew budgets are important for microprocessor designers to avoid hold-time failures and to properly allocate resources when optimizing global and local paths. Many published clock skew budgets neglect voltage jitter and process variation, which are becoming dominant factors in otherwise balanced H-trees. However, worst-case process variation(More)
—We show that distributed Infrastructure-as-a-Service (IaaS) compute clouds can be effectively used for the analysis of high energy physics data. We have designed a distributed cloud system that works with any application using large input data sets requiring a high throughput computing environment. The system uses IaaS-enabled science and commercial(More)
During the LM95 workshop, the \parse group" explored ideas on improving the language model by incorporating linguistic structure of language. The group worked on 3 related activities during the summer: development of a new Hidden Tag Model for language, initial exploration of parsing switchboard transcripts, and development of keyword selection methods for(More)
In this paper, a novel technique for multiplication is presented using Vedic multiplier. Vedic multiplier uses adders and hence making fast adder will increase the overall speed for multiplication. We have done comparative analysis for multiplication using different architectures of adder. For comparison we have taken Carry Select Adder (CSA), Square Root(More)
Advancements in sensing and embedded computation are enabling the development of new context-oriented product designs. Computational devices that are aware of their context can respond appropriately given less direct user input, helping users focus on what they are doing rather than how they are doing it. Following a brief introduction, we review some prior(More)
This paper reports on five different models of command and control. Four different models are reviewed: a process model, a contextual control model, a decision ladder model and a functional model. Further to this, command and control activities are analysed in three distinct domains: armed forces, emergency services and civilian services. From this(More)
  • 1