Sciweavers

ATAL
2006
Springer
15 years 7 months ago
Monopolizing markets by exploiting trust
We investigate trust-based relationships in electronic supply chains where trust is a measure of consistency in meeting negotiated contract deadlines. We consider scenarios where ...
Sandip Sen, Dipyaman Banerjee
127
Voted
CODES
2004
IEEE
15 years 7 months ago
Optimizing the memory bandwidth with loop fusion
The memory bandwidth largely determines the performance and energy cost of embedded systems. At the compiler level, several techniques improve the memory bandwidth at the scope of...
Paul Marchal, José Ignacio Gómez, Fr...
CODES
2004
IEEE
15 years 7 months ago
Analytical models for leakage power estimation of memory array structures
There is a growing need for accurate power models at the system level. Memory structures such as caches, Branch Target Buffers (BTBs), and register files occupy significant area i...
Mahesh Mamidipaka, Kamal S. Khouri, Nikil D. Dutt,...
124
Voted
ATAL
2006
Springer
15 years 7 months ago
Using multiagent teams to improve the training of incident commanders
The DEFACTO system is a multiagent based tool for training incident commanders for large scale disasters. In this paper, we highlight some of the lessons that we have learned from...
Nathan Schurr, Pratik Patil, Frederic H. Pighin, M...
CODES
2004
IEEE
15 years 7 months ago
RTOS-centric hardware/software cosimulator for embedded system design
This paper presents an RTOS-centric hardwareisoftware cosimulator which we have developed for embedded system design. One of the most remarkable features in our cosimulator is tha...
Shinya Honda, Takayuki Wakabayashi, Hiroyuki Tomiy...