Sciweavers

119
Voted
CAV
2006
Springer
141views Hardware» more  CAV 2006»
15 years 7 months ago
Formal Verification of a Lazy Concurrent List-Based Set Algorithm
We describe a formal verification of a recent concurrent list-based set algorithm due to Heller et al. The algorithm is optimistic: the add and remove operations traverse the list ...
Robert Colvin, Lindsay Groves, Victor Luchangco, M...
117
Voted
DATE
2004
IEEE
132views Hardware» more  DATE 2004»
15 years 7 months ago
LZW-Based Code Compression for VLIW Embedded Systems
We propose a new variable-sized-block method for VLIW code compression. Code compression traditionally works on fixed-sized blocks and its efficiency is limited by the small block...
Chang Hong Lin, Yuan Xie, Wayne Wolf
139
Voted
CAV
2006
Springer
165views Hardware» more  CAV 2006»
15 years 7 months ago
Bounded Model Checking of Concurrent Data Types on Relaxed Memory Models: A Case Study
Many multithreaded programs employ concurrent data types to safely share data among threads. However, highly-concurrent algorithms for even seemingly simple data types are difficul...
Sebastian Burckhardt, Rajeev Alur, Milo M. K. Mart...
65
Voted
DATE
2004
IEEE
128views Hardware» more  DATE 2004»
15 years 7 months ago
A Crosstalk Aware Interconnect with Variable Cycle Transmission
Lin Li, Narayanan Vijaykrishnan, Mahmut T. Kandemi...
128
Voted
DATE
2004
IEEE
111views Hardware» more  DATE 2004»
15 years 7 months ago
State-Preserving vs. Non-State-Preserving Leakage Control in Caches
This paper compares the effectiveness of statepreserving and non-state-preserving techniques for leakage control in caches by comparing drowsy cache and gated-V
Yingmin Li, Dharmesh Parikh, Yan Zhang, Karthik Sa...