Sciweavers

6102 search results - page 509 / 1221
» Generating Optimizing Specializers
Sort
View
ICCD
2003
IEEE
127views Hardware» more  ICCD 2003»
16 years 1 months ago
Structural Detection of Symmetries in Boolean Functions
Functional symmetries provide significant benefits for multiple tasks in synthesis and verification. Many applications require the manual specification of symmetries using spe...
Guoqiang Wang, Andreas Kuehlmann, Alberto L. Sangi...
92
Voted
DATE
2009
IEEE
76views Hardware» more  DATE 2009»
15 years 11 months ago
LFSR-based test-data compression with self-stoppable seeds
—The main disadvantage of LFSR-based compression is that it should be usually combined with a constrained ATPG process, and, as a result, it cannot be effectively applied to IP c...
M. Koutsoupia, Emmanouil Kalligeros, Xrysovalantis...
DATE
2009
IEEE
113views Hardware» more  DATE 2009»
15 years 11 months ago
Algorithms for the automatic extension of an instruction-set
Abstract—In this paper, two general algorithms for the automatic generation of instruction-set extensions are presented. The basic instruction set of a reconfigurable architectu...
Carlo Galuzzi, Dimitris Theodoropoulos, Roel Meeuw...
100
Voted
ISI
2007
Springer
15 years 11 months ago
Using Digital Chains of Custody on Constrained Devices to Verify Evidence
—A digital chain of custody is an account documenting digital data at a particular place and time. This paper gives a method of validating and authenticating a digital chain of c...
Phillip G. Bradford, Daniel A. Ray
CVPR
2010
IEEE
15 years 10 months ago
Towards Semantic Embedding in Visual Vocabulary
Visual vocabulary serves as a fundamental component in many computer vision tasks, such as object recognition, visual search, and scene modeling. While state-of-the-art approaches...
R.-R. Ji, Hongxun Yao, Xiaoshuai Sun