Sciweavers

1134 search results - page 19 / 227
» Optimizing Designs based on Risk Approach
Sort
View
FMOODS
2007
14 years 11 months ago
A Probabilistic Formal Analysis Approach to Cross Layer Optimization in Distributed Embedded Systems
We present a novel approach, based on probabilistic formal methods, to developing cross-layer resource optimization policies for resource limited distributed systems. One objective...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
DAC
2008
ACM
15 years 10 months ago
Symbolic noise analysis approach to computational hardware optimization
This paper addresses the problem of computational error modeling and analysis. Choosing different word-lengths for each functional unit in hardware implementations of numerical al...
Arash Ahmadi, Mark Zwolinski
DMS
2008
167views Multimedia» more  DMS 2008»
14 years 11 months ago
Testing Multi-agent Systems for Deadlock Detection Based on UML Models
There is a growing demand for Multi-Agent Systems (MAS) in the software industry. The autonomous agent interaction in a dynamic software environment can potentially lead to runtim...
Nariman Mani, Vahid Garousi, Behrouz Homayoun Far
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
15 years 3 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
JSAC
2008
114views more  JSAC 2008»
14 years 9 months ago
Design of an Optimal Bayesian Incentive Compatible Broadcast Protocol for Ad Hoc Networks with Rational Nodes
Nodes in an ad hoc wireless network incur certain costs for forwarding packets since packet forwarding consumes the resources of the nodes. If the nodes are rational, free packet f...
N. Ram Suri, Y. Narahari