Sciweavers

1240 search results - page 144 / 248
» Composition with Target Constraints
Sort
View
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
15 years 10 months ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng
EDBT
2009
ACM
102views Database» more  EDBT 2009»
15 years 4 months ago
On keys, foreign keys and nullable attributes in relational mapping systems
We consider the following scenario for a mapping system: given a source schema, a target schema, and a set of value correspondences between these two schemas, generate an executab...
Luca Cabibbo
ICRA
2009
IEEE
170views Robotics» more  ICRA 2009»
15 years 4 months ago
Characterization of the compact Hokuyo URG-04LX 2D laser range scanner
— This paper presents a detailed characterization of the Hokuyo URG-04LX 2D laser range finder. While the sensor specifications only provide a rough estimation of the sensor ac...
Laurent Kneip, Fabien Tâche, Gilles Caprari,...
ASPDAC
2009
ACM
127views Hardware» more  ASPDAC 2009»
15 years 4 months ago
Timing driven power gating in high-level synthesis
- The power gating technique is useful in reducing standby leakage current, but it increases the gate delay. For a functional unit, its maximum allowable delay (for a target clock ...
Shih-Hsu Huang, Chun-Hua Cheng
ICASSP
2008
IEEE
15 years 4 months ago
Cooperative MIMO-beamforming for multiuser relay networks
In this paper, we develop a beamforming algorithm for multiuser MIMO-relaying wireless systems. We consider a relaying scenario with multiple sources transmitting to one or more d...
Amr El-Keyi, Benoît Champagne