Sciweavers

266 search results - page 39 / 54
» Combining Software and Hardware Verification Techniques
Sort
View
134
Voted
SIGSOFT
2001
ACM
16 years 2 months ago
Detecting implied scenarios in message sequence chart specifications
Scenario-based specifications such as Message Sequence Charts (MSCs) are becoming increasingly popular as part of a requirements specification. Scenarios describe how system compo...
Jeff Kramer, Jeff Magee, Sebastián Uchitel
CODES
2009
IEEE
15 years 5 months ago
Squashing microcode stores to size in embedded systems while delivering rapid microcode accesses
Microcoded customized IPs offer superior performance and direct programmability of micro-architectural structures compared to instruction-based processors, yet at the cost of dra...
Chengmo Yang, Mingjing Chen, Alex Orailoglu
118
Voted
CHI
2004
ACM
16 years 2 months ago
Gummi: a bendable computer
Gummi is an interaction technique and device concept based on physical deformation of a handheld device. The device consists of several layers of flexible electronic components, i...
Carsten Schwesig, Ivan Poupyrev, Eijiro Mori
IH
2001
Springer
15 years 6 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
ISCA
1996
IEEE
130views Hardware» more  ISCA 1996»
15 years 6 months ago
Informing Memory Operations: Providing Memory Performance Feedback in Modern Processors
Memory latency is an important bottleneck in system performance that cannot be adequately solved by hardware alone. Several promising software techniques have been shown to addres...
Mark Horowitz, Margaret Martonosi, Todd C. Mowry, ...