Sciweavers

1763 search results - page 198 / 353
» A Formalization of Polytime Functions
Sort
View
MEMOCODE
2006
IEEE
15 years 7 months ago
802.11a transmitter: a case study in microarchitectural exploration
Hand-held devices have rigid constraints regarding power dissipation and energy consumption. Whether a new functionality can be supported often depends upon its power requirements...
Nirav Dave, Michael Pellauer, S. Gerding, Arvind
RTCSA
2006
IEEE
15 years 7 months ago
Hardware-Software Codesign of Multimedia Embedded Systems: the PeaCE
Hardware/software codesign involves various design problems including system specification, design space exploration, hardware/software co-verification, and system synthesis. A co...
Soonhoi Ha, Choonseung Lee, Youngmin Yi, Seongnam ...
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 7 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
91
Voted
MSR
2006
ACM
15 years 7 months ago
Mining eclipse for cross-cutting concerns
Software may contain functionality that does not align with its architecture. Such cross-cutting concerns do not exist from the beginning but emerge over time. By analysing where ...
Silvia Breu, Thomas Zimmermann, Christian Lindig
ASYNC
2005
IEEE
112views Hardware» more  ASYNC 2005»
15 years 7 months ago
Request-Driven GALS Technique for Wireless Communication System
A Globally Asynchronous - Locally Synchronous (GALS) technique for application in wireless communication systems is proposed and evaluated. The GALS wrappers are based on a reques...
Milos Krstic, Eckhard Grass, Christian Stahl