Sciweavers

245 search results - page 33 / 49
» Code Generation for Streaming: An Access Execute Mechanism
Sort
View
92
Voted
FM
2003
Springer
108views Formal Methods» more  FM 2003»
15 years 5 months ago
Correctness of Source-Level Safety Policies
Abstract. Program certification techniques formally show that programs satisfy certain safety policies. They rely on the correctness of the safety policy which has to be establish...
Ewen Denney, Bernd Fischer 0002
EMSOFT
2005
Springer
15 years 6 months ago
From statecharts to ESP: programming with events, states and predicates for embedded systems
Statecharts are probably the most popular mechanism for behavior modeling of embedded system components. Modeling a component involves using a mainstream language for features tha...
Vugranam C. Sreedhar, Maria-Cristina V. Marinescu
CODES
2007
IEEE
15 years 4 months ago
Influence of procedure cloning on WCET prediction
For the worst-case execution time (WCET) analysis, especially loops are an inherent source of unpredictability and loss of precision. This is caused by the difficulty to obtain sa...
Paul Lokuciejewski, Heiko Falk, Martin Schwarzer, ...
DFT
2006
IEEE
203views VLSI» more  DFT 2006»
15 years 6 months ago
Self Testing SoC with Reduced Memory Requirements and Minimized Hardware Overhead
This paper describes a methodology of creating a built-in diagnostic system of a System on Chip and experimental results of the system application on the AT94K FPSLIC with cores d...
Ondrej Novák, Zdenek Plíva, Jiri Jen...
76
Voted
HPCA
2005
IEEE
16 years 23 days ago
Distributing the Frontend for Temperature Reduction
Due to increasing power densities, both on-chip average and peak temperatures are fast becoming a serious bottleneck in processor design. This is due to the cost of removing the h...
Antonio González, Grigorios Magklis, Jos&ea...