Sciweavers

1264 search results - page 210 / 253
» Designing Safe, Reliable Systems using Scade
Sort
View
SIMUTOOLS
2008
15 years 3 months ago
Transforming sources to petri nets: a way to analyze execution of parallel programs
Model checking is a suitable formal technique to analyze parallel programs' execution in an industrial context because automated tools can be designed and operated with very ...
Jean-Baptiste Voron, Fabrice Kordon
95
Voted
CORR
2008
Springer
64views Education» more  CORR 2008»
15 years 1 months ago
An adaptive embedded architecture for real-time Particle Image Velocimetry algorithms
Particle Image Velocimetry (PIV) is a method of imaging and analysing fields of flows. The PIV techniques compute and display all the motion vectors of the field in a resulting im...
Alain Aubert, Nathalie Bochard, Virginie Fresse
ISLPED
2004
ACM
139views Hardware» more  ISLPED 2004»
15 years 7 months ago
Eliminating voltage emergencies via microarchitectural voltage control feedback and dynamic optimization
Microprocessor designers use techniques such as clock gating to reduce power dissipation. An unfortunate side-effect of these techniques is the processor current fluctuations th...
Kim M. Hazelwood, David Brooks
114
Voted
AVI
2010
15 years 3 months ago
iChase: supporting exploration and awareness of editing activities on Wikipedia
To increase its credibility and preserve the trust of its readers, Wikipedia needs to ensure a good quality of its articles. To that end, it is critical for Wikipedia administrato...
Nathalie Henry Riche, Bongshin Lee, Fanny Chevalie...
SIGCOMM
2004
ACM
15 years 7 months ago
A comparison of overlay routing and multihoming route control
The limitations of BGP routing in the Internet are often blamed for poor end-to-end performance and prolonged connectivity interruptions. Recent work advocates using overlays to e...
Aditya Akella, Jeffrey Pang, Bruce M. Maggs, Srini...