Sciweavers

1658 search results - page 196 / 332
» Implementing Bit-addressing with Specialization
Sort
View
90
Voted
TACAS
2009
Springer
136views Algorithms» more  TACAS 2009»
15 years 7 months ago
Path Feasibility Analysis for String-Manipulating Programs
We discuss the problem of path feasibility for programs manipulating strings using a collection of standard string library functions. We prove results on the complexity of this pro...
Nikolaj Bjørner, Nikolai Tillmann, Andrei V...
56
Voted
DATE
2009
IEEE
76views Hardware» more  DATE 2009»
15 years 7 months ago
LFSR-based test-data compression with self-stoppable seeds
—The main disadvantage of LFSR-based compression is that it should be usually combined with a constrained ATPG process, and, as a result, it cannot be effectively applied to IP c...
M. Koutsoupia, Emmanouil Kalligeros, Xrysovalantis...
94
Voted
DATE
2009
IEEE
122views Hardware» more  DATE 2009»
15 years 7 months ago
Model-based synthesis and optimization of static multi-rate image processing algorithms
Abstract—High computational effort in modern image processing applications like medical imaging or high-resolution video processing often demands for massively parallel special p...
Joachim Keinert, Hritam Dutta, Frank Hannig, Chris...
108
Voted
DSN
2009
IEEE
15 years 7 months ago
System safety as an emergent property in composite systems
Decomposition is used to manage system complexity, but is problematic for emergent properties such as system safety. Previously, we introduced Indirect Control Path Analysis (ICPA...
Jennifer Black, Philip Koopman
74
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Interference Subspace Tracking for Network Interference Alignment in Cellular Systems
— In this paper, a practical solution to implement the distributed interference alignment (IA) algorithm of [1] in a cellular communication system is proposed. In the training pe...
Bo Niu, Alexander M. Haimovich