Sciweavers

1602 search results - page 313 / 321
» Database Architectures for New Hardware
Sort
View
CCR
2004
143views more  CCR 2004»
14 years 9 months ago
The cutting EDGE of IP router configuration
Abstract-- Human error in configuring routers undermines attempts to provide reliable, predictable end-to-end performance on IP networks. Manual configuration, while expensive and ...
Donald F. Caldwell, Anna Gilbert, Joel Gottlieb, A...
TOCHI
1998
89views more  TOCHI 1998»
14 years 9 months ago
Using Metalevel Techniques in a Flexible Toolkit for CSCW Applications
Ideally, software toolkits for collaborative applications should provide generic, reusable components, applicable in a wide range of circumstances, which software developers can as...
Paul Dourish
DAC
2009
ACM
15 years 10 months ago
Handling complexities in modern large-scale mixed-size placement
In this paper, we propose an effective algorithm flow to handle largescale mixed-size placement. The basic idea is to use floorplanning to guide the placement of objects at the gl...
Jackey Z. Yan, Natarajan Viswanathan, Chris Chu
DAC
1999
ACM
15 years 10 months ago
Effective Iterative Techniques for Fingerprinting Design IP
While previous watermarking-based approaches to intellectual property protection (IPP) have asymmetrically emphasized the IP provider's rights, the true goal of IPP is to ens...
Andrew E. Caldwell, Hyun-Jin Choi, Andrew B. Kahng...
DAC
2004
ACM
15 years 10 months ago
A SAT-based algorithm for reparameterization in symbolic simulation
Parametric representations used for symbolic simulation of circuits usually use BDDs. After a few steps of symbolic simulation, state set representation is converted from one para...
Pankaj Chauhan, Edmund M. Clarke, Daniel Kroening