Sciweavers

9405 search results - page 1746 / 1881
» Computing a Model of Set Theory
Sort
View
148
Voted
VIS
2004
IEEE
146views Visualization» more  VIS 2004»
16 years 5 months ago
Tracking of Vector Field Singularities in Unstructured 3D Time-Dependent Datasets
In this paper, we present an approach for monitoring the positions of vector field singularities in time-dependent datasets. The concept of singularity index is discussed and exte...
Christoph Garth, Xavier Tricoche, Gerik Scheuerman...
137
Voted
DAC
2000
ACM
16 years 4 months ago
Forensic engineering techniques for VLSI CAD tools
The proliferation of the Internet has a ected the business model of almost all semiconductor and VLSI CAD companies that rely on intellectual property (IP) as their main source of...
Darko Kirovski, David T. Liu, Jennifer L. Wong, Mi...
119
Voted
DAC
2002
ACM
16 years 4 months ago
Retargetable binary utilities
Since software is playing an increasingly important role in systemon-chip, retargetable compilation has been an active research area in the last few years. However, the retargetti...
Maghsoud Abbaspour, Jianwen Zhu
141
Voted
DAC
2002
ACM
16 years 4 months ago
Dynamic and leakage power reduction in MTCMOS circuits using an automated efficient gate clustering technique
Reducing power dissipation is one of the most principle subjects in VLSI design today. Scaling causes subthreshold leakage currents to become a large component of total power diss...
Mohab Anis, Mohamed Mahmoud, Mohamed I. Elmasry, S...
121
Voted
DAC
2002
ACM
16 years 4 months ago
Hole analysis for functional coverage data
One of the main goals of coverage tools is to provide the user with informative presentation of coverage information. Specifically, information on large, cohesive sets of uncovere...
Oded Lachish, Eitan Marcus, Shmuel Ur, Avi Ziv
« Prev « First page 1746 / 1881 Last » Next »