Sciweavers

313 search results - page 27 / 63
» Error Correction Based on Verification Techniques
Sort
View
CASES
2006
ACM
15 years 1 months ago
Cost-efficient soft error protection for embedded microprocessors
Device scaling trends dramatically increase the susceptibility of microprocessors to soft errors. Further, mounting demand for embedded microprocessors in a wide array of safety c...
Jason A. Blome, Shantanu Gupta, Shuguang Feng, Sco...
52
Voted
ISCAS
2003
IEEE
93views Hardware» more  ISCAS 2003»
15 years 2 months ago
Lossless non-arbitrated address-event coding
A new address-event coding technique for off chip communication in neuromorphic and other perceptual systems is presented. Unlike all known solutions for address-event communicati...
Vladimir Brajovic
ECOOP
2008
Springer
14 years 11 months ago
Computing Stack Maps with Interfaces
Abstract. Lightweight bytecode verification uses stack maps to annotate Java bytecode programs with type information in order to reduce the verification to type checking. This pape...
Frédéric Besson, Thomas P. Jensen, T...
74
Voted
DAC
2009
ACM
15 years 10 months ago
Speculation in elastic systems
Speculation is a well-known technique for increasing parallelism of the microprocessor pipelines and hence their performance. While implementing speculation in modern design pract...
Marc Galceran Oms, Jordi Cortadella, Michael Kishi...
71
Voted
ICALP
2009
Springer
15 years 10 months ago
Correlation Clustering Revisited: The "True" Cost of Error Minimization Problems
Correlation Clustering was defined by Bansal, Blum, and Chawla as the problem of clustering a set of elements based on a possibly inconsistent binary similarity function between e...
Nir Ailon, Edo Liberty