Sciweavers

2501 search results - page 381 / 501
» Logics with Rank Operators
Sort
View
IWMM
2009
Springer
122views Hardware» more  IWMM 2009»
15 years 11 months ago
Parametric heap usage analysis for functional programs
This paper presents an analysis that derives a formula describing the worst-case live heap space usage of programs in a functional language with automated memory management (garba...
Leena Unnikrishnan, Scott D. Stoller
133
Voted
FGCN
2008
IEEE
132views Communications» more  FGCN 2008»
15 years 11 months ago
Deriving Safety Properties for Home Network System Based on Goal-Oriented Hazard Analysis Model
The home network system (HNS, for short) is comprised of networked home appliances, which achieves various value-added services for home users. Assuring safety of the HNS and the ...
Ben Yan, Masahide Nakamura, Ken-ichi Matsumoto
125
Voted
DATE
2007
IEEE
80views Hardware» more  DATE 2007»
15 years 11 months ago
Engineering trust with semantic guardians
The ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trust...
Ilya Wagner, Valeria Bertacco
HICSS
2007
IEEE
153views Biometrics» more  HICSS 2007»
15 years 11 months ago
Mobile TV - To Live or Die by Content
Mobile TV is described as a natural and evolutionary next step as mobile phones get more multimedia features. Mobile network operators expect mobile TV to support the adoption of ...
Christer Carlsson, Pirkko Walden
ISCAS
2007
IEEE
96views Hardware» more  ISCAS 2007»
15 years 11 months ago
Novel High-Speed Redundant Binary to Binary converter using Prefix Networks
— Fast addition and multiplication are of paramount importance in many arithmetic circuits and processors. The use of redundant number system for efficient implementation of thes...
Sreehari Veeramachaneni, Kirthi M. Krishna, Lingam...