Sciweavers

937 search results - page 66 / 188
» Employing Simulation to Evaluate Designs: The APEX Approach
Sort
View
SBACPAD
2006
IEEE
102views Hardware» more  SBACPAD 2006»
15 years 5 months ago
Ultra-Fast CPU Performance Prediction: Extending the Monte Carlo Approach
Performance evaluation of contemporary processors is becoming increasingly difficult due to the lack of proper frameworks. Traditionally, cycle-accurate simulators have been exte...
Ram Srinivasan, Jeanine Cook, Olaf M. Lubeck
SIGCOMM
2004
ACM
15 years 5 months ago
A wavelet-based approach to detect shared congestion
Per-flow congestion control helps endpoints fairly and efficiently share network resources. Better utilization of network resources can be achieved, however, if congestion manag...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....
DSS
2008
146views more  DSS 2008»
14 years 12 months ago
Design choices for agent-based control of AGVs in the dough making process
In this paper we consider a multi-agent system (MAS) for the logistics control of Automatic Guided Vehicles (AGVs) that are used in the dough making process at an industrial baker...
Martijn Mes, Matthieu van der Heijden, Jos van Hil...
DATE
2004
IEEE
134views Hardware» more  DATE 2004»
15 years 3 months ago
Cost-Efficient Block Verification for a UMTS Up-Link Chip-Rate Coprocessor
ASIC designs for future communication applications cannot be simulated exhaustively. Formal Property Checking is a powerful technology to overcome the limitations of current funct...
Klaus Winkelmann, Hans-Joachim Trylus, Dominik Sto...
RECONFIG
2009
IEEE
172views VLSI» more  RECONFIG 2009»
15 years 6 months ago
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow
Abstract—The main challenge when implementing cryptographic algorithms in hardware is to protect them against attacks that target directly the device. Two strategies are customar...
Shivam Bhasin, Jean-Luc Danger, Florent Flament, T...