Sciweavers

1240 search results - page 144 / 248
» Composition with Target Constraints
Sort
View
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
16 years 4 months ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng
EDBT
2009
ACM
102views Database» more  EDBT 2009»
15 years 11 months ago
On keys, foreign keys and nullable attributes in relational mapping systems
We consider the following scenario for a mapping system: given a source schema, a target schema, and a set of value correspondences between these two schemas, generate an executab...
Luca Cabibbo
ICRA
2009
IEEE
170views Robotics» more  ICRA 2009»
15 years 10 months ago
Characterization of the compact Hokuyo URG-04LX 2D laser range scanner
— This paper presents a detailed characterization of the Hokuyo URG-04LX 2D laser range finder. While the sensor specifications only provide a rough estimation of the sensor ac...
Laurent Kneip, Fabien Tâche, Gilles Caprari,...
ASPDAC
2009
ACM
127views Hardware» more  ASPDAC 2009»
15 years 10 months ago
Timing driven power gating in high-level synthesis
- The power gating technique is useful in reducing standby leakage current, but it increases the gate delay. For a functional unit, its maximum allowable delay (for a target clock ...
Shih-Hsu Huang, Chun-Hua Cheng
ICASSP
2008
IEEE
15 years 10 months ago
Cooperative MIMO-beamforming for multiuser relay networks
In this paper, we develop a beamforming algorithm for multiuser MIMO-relaying wireless systems. We consider a relaying scenario with multiple sources transmitting to one or more d...
Amr El-Keyi, Benoît Champagne