Sciweavers

41 search results - page 8 / 9
» Automatically Exploiting Symmetries in Constraint Programmin...
Sort
View
DATE
2008
IEEE
117views Hardware» more  DATE 2008»
14 years 19 days ago
A Scalable Algorithmic Framework for Row-Based Power-Gating
Leakage power is a serious concern in nanometer CMOS technologies. In this paper we focus on leakage reduction through automatic insertion of sleep transistors for power gating in...
Ashoka Visweswara Sathanur, Antonio Pullini, Luca ...
AAAI
1992
13 years 7 months ago
Automated Model Selection Using Context-Dependent Behaviors
Effective problem-solving about complex engineered devices requires device models that are both adequate for the problem and computationally efficient . Producing such models requ...
P. Pandurang Nayak, Leo Joskowicz, Sanjaya Addanki
FMCO
2003
Springer
162views Formal Methods» more  FMCO 2003»
13 years 11 months ago
An MDA Approach to Tame Component Based Software Development
Abstract. The aim of this paper is to show how the Model Driven Architecture (MDA) can be used in relation with component based software engineering. A software component only exhi...
Jean-Marc Jézéquel, Olivier Defour, ...
PVLDB
2010
115views more  PVLDB 2010»
13 years 4 months ago
CORADD: Correlation Aware Database Designer for Materialized Views and Indexes
We describe an automatic database design tool that exploits correlations between attributes when recommending materialized views (MVs) and indexes. Although there is a substantial...
Hideaki Kimura, George Huo, Alexander Rasin, Samue...
SIGSOFT
2003
ACM
14 years 6 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler