Sciweavers

7623 search results - page 1312 / 1525
» Constructive Volume Modeling
Sort
View
ICCAD
2000
IEEE
124views Hardware» more  ICCAD 2000»
15 years 8 months ago
A Methodology for Verifying Memory Access Protocols in Behavioral Synthesis
— Memory is one of the most important components to be optimized in the several phases of the synthesis process. ioral synthesis, a memory is viewed as an abstract construct whic...
Gernot Koch, Taewhan Kim, Reiner Genevriere
ICCAD
2000
IEEE
138views Hardware» more  ICCAD 2000»
15 years 8 months ago
Fast Analysis and Optimization of Power/Ground Networks
This paper presents an efficient method for optimizing power/ground (P/G) networks by widening wires and adding decoupling capacitors (decaps). It proposes a structured skeleton t...
Haihua Su, Kaushik Gala, Sachin S. Sapatnekar
SAC
2000
ACM
15 years 8 months ago
The Evolution of the DARWIN System
DARWIN is a web-based system for presenting the results of wind-tunnel testing and computational model analyses to aerospace designers. DARWIN captures the data, maintains the inf...
Joan D. Walton, Robert E. Filman, David J. Korsmey...
AMAST
2000
Springer
15 years 8 months ago
Meta Languages in Algebraic Compilers
Abstract. Algebraic compilers provide a powerful and convenient mechanism for specifying language translators. With each source language operation one associates a computation for ...
Eric Van Wyk
CAISE
2000
Springer
15 years 8 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
« Prev « First page 1312 / 1525 Last » Next »