Sciweavers

2779 search results - page 380 / 556
» Modelling Immunological Memory
Sort
View
130
Voted
AMAST
2004
Springer
15 years 9 months ago
On Guard: Producing Run-Time Checks from Integrity Constraints
Abstract. Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code execut...
Michael Benedikt, Glenn Bruns
126
Voted
ESTIMEDIA
2004
Springer
15 years 9 months ago
Application design trajectory towards reusable coprocessors MPEG case study
This paper presents a structured application design trajectory to transform media-processing applications— modeled as Kahn process network—into a set of functionspecific hardw...
Martijn J. Rutten, Om Prakash Gangwal, Jos T. J. v...
135
Voted
LATIN
2004
Springer
15 years 9 months ago
Distributed Games and Distributed Control for Asynchronous Systems
Abstract. We introduce distributed games over asynchronous transition systems to model a distributed controller synthesis problem. A game involves two teams and is not turn-based: ...
Paul Gastin, Benjamin Lerman, Marc Zeitoun
PATMOS
2004
Springer
15 years 9 months ago
Optimal Logarithmic Representation in Terms of SNR Behavior
This paper investigates the Signal-to-Noise Ratio (SNR) performance of the Logarithmic Number System (LNS) representation against the SNR performance of the fixed-point representa...
Panagiotis D. Vouzis, Vassilis Paliouras
SAT
2004
Springer
95views Hardware» more  SAT 2004»
15 years 9 months ago
Local Search for Very Large SAT Problems
The Walksat local search algorithm has previously been extended to handle quantification over variables. This greatly reduces model sizes, but in order to guide greedy moves the a...
Steven David Prestwich, Colin Quirke