Sciweavers

1518 search results - page 225 / 304
» Cryptographic Test Correction
Sort
View
84
Voted
CASES
2007
ACM
15 years 4 months ago
Non-transparent debugging for software-pipelined loops
This paper tackles the problem of providing correct information about program variable values in a software-pipelined loop through a non-transparent debugging approach. Since mode...
Hugo Venturini, Frédéric Riss, Jean-...
110
Voted
CEC
2007
IEEE
15 years 4 months ago
Efficient assembling of genome fragments using genetic algorithm enhanced by heuristic search
Abstract-- Shotgun sequencing is the state-of-the-art to decode genome sequence. However this technique needs a lot of fragments. Combining those fragments correctly requires enorm...
Satoko Kikuchi, Goutam Chakraborty
113
Voted
GLVLSI
2007
IEEE
151views VLSI» more  GLVLSI 2007»
15 years 4 months ago
Hand-in-hand verification of high-level synthesis
This paper describes a formal verification methodology of highnthesis (HLS) process. The abstraction level of the input to HLS is so high compared to that of the output that the v...
Chandan Karfa, Dipankar Sarkar, Chittaranjan A. Ma...
ICCTA
2007
IEEE
15 years 4 months ago
Register Sharing Verification During Data-Path Synthesis
The variables of the high-level specifications and the automatically generated temporary variables are mapped on to the data-path registers during data-path synthesis phase of hig...
Chandan Karfa, Chittaranjan A. Mandal, Dipankar Sa...
3DPVT
2004
IEEE
119views Visualization» more  3DPVT 2004»
15 years 4 months ago
Frequency Domain Registration of Computer Tomography Data
This paper presents a new method for registering computer tomography (CT) volumetric data of human bone structures relative to observations made at different times. The system we ...
Marco Andreetto, Guido Maria Cortelazzo, Luca Lucc...