Sciweavers

8 search results - page 2 / 2
» A Methodology for Verifying Memory Access Protocols in Behav...
Sort
View
ICCAD
2002
IEEE
94views Hardware» more  ICCAD 2002»
14 years 2 months ago
High-level synthesis of distributed logic-memory architectures
Abstract— With the increasing cost of global communication onchip, high-performance designs for data-intensive applications require architectures that distribute hardware resourc...
Chao Huang, Srivaths Ravi, Anand Raghunathan, Nira...
SIGMETRICS
2006
ACM
121views Hardware» more  SIGMETRICS 2006»
13 years 11 months ago
Transient analysis of tree-Like processes and its application to random access systems
A new methodology to assess transient performance measures of tree-like processes is proposed by introducing the concept of tree-like processes with marked time epochs. As opposed...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...
OOPSLA
2007
Springer
13 years 11 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich