Sciweavers

21319 search results - page 4000 / 4264
» An Approach for Method Reengineering
Sort
View
ICCD
2008
IEEE
221views Hardware» more  ICCD 2008»
16 years 1 months ago
Reversi: Post-silicon validation system for modern microprocessors
— Verification remains an integral and crucial phase of today’s microprocessor design and manufacturing process. Unfortunately, with soaring design complexities and decreasing...
Ilya Wagner, Valeria Bertacco
ICCAD
2007
IEEE
102views Hardware» more  ICCAD 2007»
16 years 1 months ago
Scalable exploration of functional dependency by interpolation and incremental SAT solving
Functional dependency is concerned with rewriting a Boolean function f as a function h over a set of base functions {g1, …, gn}, i.e. f = h(g1, …, gn). It plays an important r...
Chih-Chun Lee, Jie-Hong Roland Jiang, Chung-Yang H...
ICCAD
2006
IEEE
119views Hardware» more  ICCAD 2006»
16 years 1 months ago
Post-placement voltage island generation
High power consumption will shorten battery life for handheld devices and cause thermal and reliability problems. One way to lower the dynamic power consumption is to reduce the s...
Royce L. S. Ching, Evangeline F. Y. Young, Kevin C...
ICCAD
2006
IEEE
112views Hardware» more  ICCAD 2006»
16 years 1 months ago
A new RLC buffer insertion algorithm
Most existing buffering algorithms neglect the impact of inductance on circuit performance, which causes large error in circuit analysis and optimization. Even for the approaches...
Zhanyuan Jiang, Shiyan Hu, Jiang Hu, Zhuo Li, Weip...
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
15 years 12 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
« Prev « First page 4000 / 4264 Last » Next »