Sciweavers

7961 search results - page 1289 / 1593
» Input-Output Model Programs
Sort
View
CSFW
1999
IEEE
15 years 8 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
DFT
1999
IEEE
119views VLSI» more  DFT 1999»
15 years 8 months ago
RAMSES: A Fast Memory Fault Simulator
In this paper, we present a memory fault simulator called the Random Access Memory Simulator for Error Screening (RAMSES). Although it was designed based on some wellknown memory ...
Chi-Feng Wu, Chih-Tsun Huang, Cheng-Wen Wu
ICCAD
1999
IEEE
153views Hardware» more  ICCAD 1999»
15 years 8 months ago
Cycle time and slack optimization for VLSI-chips
We consider the problem of finding an optimal clock schedule, i.e. optimal arrival times for clock signals at latches of a VLSI chip. We describe a general model which includes al...
Christoph Albrecht, Bernhard Korte, Jürgen Sc...
ICRA
1999
IEEE
97views Robotics» more  ICRA 1999»
15 years 8 months ago
Clustering of Qualitative Contact States for a Transmission Assembly
Current manufacturing methods for robotic-controlled assembly rely on accurate positioning to ensure task completion, often through the use of special xtures and precise calibrati...
Marjorie Skubic, Benjamin Forrester, Brent Nowak
IPPS
1999
IEEE
15 years 8 months ago
SCALA: A Framework for Performance Evaluation of Scalable Computing
Abstract. Conventional performance environments are based on pro ling and event instrumentation. It becomes problematic as parallel systems scale to hundreds of nodes and beyond. A...
Xian-He Sun, Mario Pantano, Thomas Fahringer, Zhao...
« Prev « First page 1289 / 1593 Last » Next »