Sciweavers

2421 search results - page 157 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
115
Voted
ISN
1999
Springer
15 years 7 months ago
The Use of TINA Principles in the Management of Internet Multimedia Conferences
This paper shows how some of the TINA principles used in the development of Service Management techniques for the Broadband ISDN may be applied to the management of Internet Servic...
Quincy Cabell, Peter T. Kirstein, Theodore Pagtzis...
ITC
2002
IEEE
81views Hardware» more  ITC 2002»
15 years 8 months ago
Design Rewiring Using ATPG
—Logic optimization is the step of the very large scale integration (VLSI) design cycle where the designer performs modifications on a design to satisfy different constraints suc...
Andreas G. Veneris, Magdy S. Abadir, Mandana Amiri
124
Voted
IPM
2010
133views more  IPM 2010»
15 years 1 months ago
A concept-relationship acquisition and inference approach for hierarchical taxonomy construction from tags
Taxonomy construction is a resource-demanding, top down, and time consuming effort. It does not always cater for the prevailing context of the captured information. This paper pro...
Eric Tsui, W. M. Wang, Chi Fai Cheung, Adela S. M....
122
Voted
TAP
2008
Springer
102views Hardware» more  TAP 2008»
15 years 3 months ago
A Logic-Based Approach to Combinatorial Testing with Constraints
Abstract. Usage of combinatorial testing is wide spreading as an effective technique to reveal unintended feature interaction inside a given system. To this aim, test cases are con...
Andrea Calvagna, Angelo Gargantini
123
Voted
DAC
1995
ACM
15 years 7 months ago
A Transformation-Based Approach for Storage Optimization
High-level synthesis (HLS) has been successfully targeted towards the digital signal processing (DSP) domain. Both application-speci c integrated circuits (ASICs) and application-...
Wei-Kai Cheng, Youn-Long Lin