Sciweavers

27 search results - page 2 / 6
» Re-configuration of sub-blocks for effective application of ...
Sort
View
ISSS
1998
IEEE
103views Hardware» more  ISSS 1998»
13 years 9 months ago
False Path Analysis Based on a Hierarchical Control Representation
False path analysis is an activity with applications in a variety of computer science and engineering domains like for instance high-level synthesis, worst case execution time est...
Apostolos A. Kountouris, Christophe Wolinski
DAC
1994
ACM
13 years 9 months ago
Dynamic Search-Space Pruning Techniques in Path Sensitization
A powerful combinational path sensitization engine is required for the efficient implementation of tools for test pattern generation, timing analysis, and delay fault testing. Path...
João P. Marques Silva, Karem A. Sakallah
KDD
2009
ACM
269views Data Mining» more  KDD 2009»
14 years 5 months ago
Extracting discriminative concepts for domain adaptation in text mining
One common predictive modeling challenge occurs in text mining problems is that the training data and the operational (testing) data are drawn from different underlying distributi...
Bo Chen, Wai Lam, Ivor Tsang, Tak-Lam Wong
ISQED
2003
IEEE
109views Hardware» more  ISQED 2003»
13 years 10 months ago
Modeling and Analysis of Power Distribution Networks for Gigabit Applications
—As the operating frequency of digital systems increases and voltage swing decreases, it becomes very important to characterize and analyze power distribution networks (PDNs) acc...
Wendemagegnehu T. Beyene, Chuck Yuan, Joong-Ho Kim...
ITC
1998
IEEE
59views Hardware» more  ITC 1998»
13 years 9 months ago
Stimulus generation for built-in self-test of charge-pump phase-locked loops
Abstract - This paper addresses the issue of the stimulation of charge-pump phase-locked loops for built-in selftest applications. It is shown that three nodes of the PLL qualify f...
Benoît R. Veillette, Gordon W. Roberts