Sciweavers

1791 search results - page 190 / 359
» Behavioral Operations
Sort
View
ICCAD
2003
IEEE
115views Hardware» more  ICCAD 2003»
16 years 1 months ago
Efficient Verification of Hazard-Freedom in Gate-Level Timed Asynchronous Circuits
This paper presents an efficient method for verifying hazard freedom in timed asynchronous circuits. Timed circuits are a class of asynchronous circuits that utilize explicit tim...
Curtis A. Nelson, Chris J. Myers, Tomohiro Yoneda
SOSP
2001
ACM
16 years 1 months ago
Storage Management and Caching in PAST, A Large-scale, Persistent Peer-to-peer Storage Utility
This paper presents and evaluates the storage management and caching in PAST, a large-scale peer-to-peer persistent storage utility. PAST is based on a self-organizing, Internetba...
Antony I. T. Rowstron, Peter Druschel
FOSSACS
2010
Springer
15 years 11 months ago
CIA Structures and the Semantics of Recursion
Final coalgebras for a functor serve as semantic domains for state based systems of various types. For example, formal languages, streams, nonwell-founded sets and behaviors of CCS...
Stefan Milius, Lawrence S. Moss, Daniel Schwencke
ICONS
2009
IEEE
15 years 10 months ago
Modeling System Safety Requirements Using Input/Output Constraint Meta-automata
Most recent software related accidents have been system accidents. To validate the absence of system hazards concerning dysfunctional interactions, industrials call for approaches...
Zhe Chen, Gilles Motet
IWMM
2009
Springer
122views Hardware» more  IWMM 2009»
15 years 10 months ago
Parametric heap usage analysis for functional programs
This paper presents an analysis that derives a formula describing the worst-case live heap space usage of programs in a functional language with automated memory management (garba...
Leena Unnikrishnan, Scott D. Stoller