Sciweavers

2421 search results - page 291 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
163
Voted
EURODAC
1994
IEEE
145views VHDL» more  EURODAC 1994»
15 years 9 months ago
Testability analysis and improvement from VHDL behavioral specifications
This paper presents a testability improvement method for digital systems described in VHDL behavioral specification. The method is based on testability analysis at registertransfe...
Xinli Gu, Krzysztof Kuchcinski, Zebo Peng
DDECS
2006
IEEE
146views Hardware» more  DDECS 2006»
15 years 8 months ago
Automatic Identification of Timing Anomalies for Cycle-Accurate Worst-Case Execution Time Analysis
Abstract-- Hard real-time systems need methods to determine upper bounds for their execution times, usually called worst-case execution times. Timing anomalies are counterintuitive...
Jochen Eisinger, Ilia Polian, Bernd Becker, Alexan...
137
Voted
ESAW
2006
Springer
15 years 8 months ago
An Algorithm for Conflict Resolution in Regulated Compound Activities
The use of norms is a well-known technique of co-ordination in multi-agent systems (MAS) adopted from human societies. A normative position is the "social burden" associa...
Andrés García-Camino, Pablo Noriega,...
ICS
1995
Tsinghua U.
15 years 8 months ago
Optimum Modulo Schedules for Minimum Register Requirements
Modulo scheduling is an e cient technique for exploiting instruction level parallelism in a variety of loops, resulting in high performance code but increased register requirement...
Alexandre E. Eichenberger, Edward S. Davidson, San...
IIS
2004
15 years 6 months ago
Query Selectivity Estimation via Data Mining
Estimating the result size of a join is an important query optimization problem as it determines the choice of a good query evaluation strategy. Yet, there are few efficient techni...
Jarek Gryz, Dongming Liang