Sciweavers

MEMOCODE
2008
IEEE
13 years 11 months ago
Bisimulator 2.0: An On-the-Fly Equivalence Checker based on Boolean Equation Systems
Equivalence checking is a classical verification method determining if a finite-state concurrent system (protocol) satisfies its desired external behaviour (service) by compari...
Radu Mateescu, Emilie Oudot
MEMOCODE
2008
IEEE
13 years 11 months ago
Virtual prototyping AADL architectures in a polychronous model of computation
While synchrony and asynchrony are two distinct concepts of concurrency theory, effective and formally defined embedded system design methodologies usually mix the best from both...
Ma Yue, Jean-Pierre Talpin, Thierry Gautier
MEMOCODE
2008
IEEE
13 years 11 months ago
H.264 Decoder: A Case Study in Multiple Design Points
Kermin Fleming, Chun-Chieh Lin, Nirav Dave, Arvind...
MEMOCODE
2008
IEEE
13 years 11 months ago
From Data to Events: Checking Properties on the Control of a System
We present a component-based description language for heterogeneous systems composed of several data flow processing components and a unique eventbased controller. Descriptions a...
Christophe Jacquet, Frédéric Boulang...
MEMOCODE
2008
IEEE
13 years 11 months ago
MEMOCODE 2008 Co-Design Contest
The second MEMOCODE hardware/software codesign contest invites participants to solve a practical hardware/software codesign problem within the time span of one month. The larger o...
Patrick Schaumont, Krste Asanovic, James C. Hoe
MEMOCODE
2008
IEEE
13 years 11 months ago
Estimating the Performance of Cache Replacement Policies
—Caches are commonly employed to hide the latency gap between memory and the CPU by exploiting locality in memory accesses. The cache performance strongly influences a system’...
Daniel Grund, Jan Reineke
MEMOCODE
2008
IEEE
13 years 11 months ago
Static Deadlock Detection for the SHIM Concurrent Language
Concurrent programming languages are becoming mandatory with the advent of multi-core processors. Two major concerns in any concurrent program are data races and deadlocks. Each a...
Nalini Vasudevan, Stephen A. Edwards
MEMOCODE
2008
IEEE
13 years 11 months ago
High-throughput Pipelined Mergesort
Abstract: We present an implementation of a highthroughput cryptosorter, capable of sorting an encrypted database of eight megabytes in .15 seconds; 1102 times faster than a softwa...
Kermin Fleming, Myron King, Man Cheuk Ng, Asif Kha...