Sciweavers

1597 search results - page 203 / 320
» A Design Method for Object-Oriented Programming
Sort
View
LCTRTS
2010
Springer
15 years 8 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
ICCAD
2008
IEEE
98views Hardware» more  ICCAD 2008»
16 years 8 days ago
Performance optimization of elastic systems using buffer resizing and buffer insertion
Abstract—Buffer resizing and buffer insertion are two transformation techniques for the performance optimization of elastic systems. Different approaches for each technique have ...
Dmitry Bufistov, Jorge Júlvez, Jordi Cortad...
ICPR
2000
IEEE
16 years 4 months ago
Automatic Video Scene Extraction by Shot Grouping
For more efficient organizing, browsing, and retrieving digital video content, it is important to extract video structure information at both scene and shot levels. This paper pre...
Tong Lin, HongJiang Zhang
DAC
2001
ACM
16 years 4 months ago
Testing for Interconnect Crosstalk Defects Using On-Chip Embedded Processor Cores
Crosstalk effects degrade the integrity of signals traveling on long interconnects and must be addressed during manufacturing testing. External testing for crosstalk is expensive ...
Li Chen, Xiaoliang Bai, Sujit Dey
ICRA
2008
IEEE
145views Robotics» more  ICRA 2008»
15 years 9 months ago
Acquiring change models for sensor-based robot manipulation
—The aim of this paper is to enable a programmer to easily employ external sensors for flexible robot manipulation. We describe a general approach to determine the relation betwe...
Jan Deiterding, Dominik Henrich