Sciweavers

266 search results - page 15 / 54
» Combining Software and Hardware Verification Techniques
Sort
View
133
Voted
PARA
2004
Springer
15 years 7 months ago
Cache Optimizations for Iterative Numerical Codes Aware of Hardware Prefetching
Cache optimizations typically include code transformations to increase the locality of memory accesses. An orthogonal approach is to enable for latency hiding by introducing prefet...
Josef Weidendorfer, Carsten Trinitis
123
Voted
CASES
2010
ACM
14 years 11 months ago
Hardware trust implications of 3-D integration
3-D circuit-level integration is a chip fabrication technique in which two or more dies are stacked and combined into a single circuit through the use of vertical electroconductiv...
Ted Huffmire, Timothy E. Levin, Michael Bilzor, Cy...
EDBTW
2006
Springer
15 years 3 months ago
Efficient Integrity Checking over XML Documents
The need for incremental constraint maintenance within collections of semi-structured documents has been ever increasing in the last years due to the widespread diffusion of XML. T...
Daniele Braga, Alessandro Campi, Davide Martinengh...
RTAS
2008
IEEE
15 years 8 months ago
Incorporating Resource Safety Verification to Executable Model-based Development for Embedded Systems
This paper formulates and illustrates the integration of resource safety verification into a design methodology for development of verified and robust real-time embedded systems. ...
Jianliang Yi, Honguk Woo, James C. Browne, Aloysiu...
AVI
2008
15 years 4 months ago
Interactive visual interfaces for evacuation planning
To support planning of massive transportations under time-critical conditions, in particular, evacuation of people from a disasteraffected area, we have developed a software modul...
Gennady L. Andrienko, Natalia V. Andrienko, Ulrich...