Sciweavers

3516 search results - page 614 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
154
Voted
JSA
2010
173views more  JSA 2010»
14 years 10 months ago
Hardware/software support for adaptive work-stealing in on-chip multiprocessor
During the past few years, embedded digital systems have been requested to provide a huge amount of processing power and functionality. A very likely foreseeable step to pursue th...
Quentin L. Meunier, Frédéric P&eacut...
133
Voted
HPCN
2000
Springer
15 years 7 months ago
A Java-Based Parallel Programming Support Environment
The Java programming language and environment is stimulating new research activities in many areas of computing, not the least of which is parallel computing. Parallel techniques ...
Kenneth A. Hawick, Heath A. James
180
Voted
TACAS
2000
Springer
151views Algorithms» more  TACAS 2000»
15 years 7 months ago
Salsa: Combining Constraint Solvers with BDDs for Automatic Invariant Checking
Salsa is an invariant checker for speci cations in SAL the SCR Abstract Language. To establish a formula as an invariant without any user guidance Salsa carries out an induction pr...
Ramesh Bharadwaj, Steve Sims
112
Voted
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 10 months ago
BER Analysis in A Generalized UWB Frequency Selective Fading Channel With Randomly Arriving Clusters and Rays
— In this paper, we present an analytical method to evaluate the bit error rate (BER) of the ultra-wideband (UWB) system in the IEEE 802.15.4a standardized channel model. The IEE...
Wei-Cheng Liu, Li-Chun Wang
143
Voted
JAR
2006
103views more  JAR 2006»
15 years 3 months ago
A Framework for Verifying Bit-Level Pipelined Machines Based on Automated Deduction and Decision Procedures
We describe an approach to verifying bit-level pipelined machine models using a combination of deductive reasoning and decision procedures. While theorem proving systems such as AC...
Panagiotis Manolios, Sudarshan K. Srinivasan