Sciweavers

7200 search results - page 1151 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
87
Voted
ISLPED
2006
ACM
122views Hardware» more  ISLPED 2006»
15 years 6 months ago
Dynamic thermal clock skew compensation using tunable delay buffers
—The thermal gradients existing in high-performance circuits may significantly affect their timing behavior, in particular, by increasing the skew of the clock net and/or alteri...
Ashutosh Chakraborty, Karthik Duraisami, Ashoka Vi...
114
Voted
IWCMC
2006
ACM
15 years 6 months ago
Radio propagation patterns in wireless sensor networks: new experimental results
Wireless sensors use low power radio transceivers due to the stringent constraints on battery capacity. As a result, radio transmission with wireless sensors is unreliable. Furthe...
Tereus Scott, Kui Wu, Daniel Hoffman
MOBICOM
2006
ACM
15 years 6 months ago
A software architecture for physical layer wireless network emulation
Despite their widespread deployment, many aspects of wireless network performance are poorly understood, and there is great room from improvement in wireless network reliability a...
Glenn Judd, Peter Steenkiste
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
15 years 6 months ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...
SIGSOFT
2006
ACM
15 years 6 months ago
Interpolation for data structures
Interpolation based automatic abstraction is a powerful and robust technique for the automated analysis of hardware and software systems. Its use has however been limited to contr...
Deepak Kapur, Rupak Majumdar, Calogero G. Zarba
« Prev « First page 1151 / 1440 Last » Next »