Sciweavers

1264 search results - page 210 / 253
» Designing Safe, Reliable Systems using Scade
Sort
View
SIMUTOOLS
2008
15 years 6 months ago
Transforming sources to petri nets: a way to analyze execution of parallel programs
Model checking is a suitable formal technique to analyze parallel programs' execution in an industrial context because automated tools can be designed and operated with very ...
Jean-Baptiste Voron, Fabrice Kordon
CORR
2008
Springer
64views Education» more  CORR 2008»
15 years 5 months ago
An adaptive embedded architecture for real-time Particle Image Velocimetry algorithms
Particle Image Velocimetry (PIV) is a method of imaging and analysing fields of flows. The PIV techniques compute and display all the motion vectors of the field in a resulting im...
Alain Aubert, Nathalie Bochard, Virginie Fresse
ISLPED
2004
ACM
139views Hardware» more  ISLPED 2004»
15 years 10 months ago
Eliminating voltage emergencies via microarchitectural voltage control feedback and dynamic optimization
Microprocessor designers use techniques such as clock gating to reduce power dissipation. An unfortunate side-effect of these techniques is the processor current fluctuations th...
Kim M. Hazelwood, David Brooks
AVI
2010
15 years 6 months ago
iChase: supporting exploration and awareness of editing activities on Wikipedia
To increase its credibility and preserve the trust of its readers, Wikipedia needs to ensure a good quality of its articles. To that end, it is critical for Wikipedia administrato...
Nathalie Henry Riche, Bongshin Lee, Fanny Chevalie...
151
Voted
SIGCOMM
2004
ACM
15 years 10 months ago
A comparison of overlay routing and multihoming route control
The limitations of BGP routing in the Internet are often blamed for poor end-to-end performance and prolonged connectivity interruptions. Recent work advocates using overlays to e...
Aditya Akella, Jeffrey Pang, Bruce M. Maggs, Srini...