Sciweavers

3820 search results - page 500 / 764
» Bounded Model Debugging
Sort
View
113
Voted
ICCAD
1998
IEEE
96views Hardware» more  ICCAD 1998»
15 years 7 months ago
Test set compaction algorithms for combinational circuits
This paper presents two new algorithms, Redundant Vector Elimination(RVE) and Essential Fault Reduction (EFR), for generating compact test sets for combinational circuits under th...
Ilker Hamzaoglu, Janak H. Patel
ICNP
1998
IEEE
15 years 7 months ago
Congestion Control Performance of a Reliable Multicast Protocol
This paper evaluates the congestion control performance of Pseudofed, a congestion-controlled, reliable multicast transport protocol for bulk data transfer. Pseudofed's conge...
Dante DeLucia, Katia Obraczka
PODC
1997
ACM
15 years 7 months ago
Computing Vector Functions on Anonymous Networks
In an anonymous network processors have no distinct identifiers. For any class of anonymous networks, we characterize effectively the vector functions f : n → n which are compu...
Paolo Boldi, Sebastiano Vigna
157
Voted
ICDCS
1993
IEEE
15 years 7 months ago
Maintaining Information about Persistent Replicated Objects in a Distributed System
The paper presents a general model for persistent replicated object management and identifies what meta information about objects needs to be maintained by a naming and binding se...
Mark C. Little, Daniel L. McCue, Santosh K. Shriva...
112
Voted
ICRA
1993
IEEE
104views Robotics» more  ICRA 1993»
15 years 7 months ago
Numerical Determination of Optimal Non-Holonomic Paths in the Presence of Obstacles
This paper addresses the problem of numerically finding an optimal path for a robot with non-holonomic constraints. A car like robot, whose turning radius is lower bounded is cons...
Sudhaker Samuel, S. Sathiya Keerthi