Sciweavers

285 search results - page 40 / 57
» Performance and Functional Verification of Microprocessors
Sort
View
126
Voted
ICLP
2007
Springer
15 years 7 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...
110
Voted
ASPDAC
2007
ACM
89views Hardware» more  ASPDAC 2007»
15 years 7 months ago
Trace Compaction using SAT-based Reachability Analysis
In today's designs, when functional verification fails, engineers perform debugging using the provided error traces. Reducing the length of error traces can help the debugging...
Sean Safarpour, Andreas G. Veneris, Hratch Mangass...
110
Voted
CORR
2007
Springer
68views Education» more  CORR 2007»
15 years 3 months ago
A numerical approach for 3D manufacturing tolerances synthesis
: Making a product conform to the functional requirements indicated by the customer suppose to be able to manage the manufacturing process chosen to realise the parts. A simulation...
Frédéric Vignat, François Vil...
127
Voted
SAFECOMP
2007
Springer
15 years 9 months ago
Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System
A strategy and relating activities of a software safety analysis (SSA) are presented for the software of a digital reactor protection system where software modules in the design de...
Gee-Yong Park, Jang-Soo Lee, Se Woo Cheon, Kee-Cho...
131
Voted
ICISC
2001
162views Cryptology» more  ICISC 2001»
15 years 5 months ago
Content Extraction Signatures
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...
Ron Steinfeld, Laurence Bull, Yuliang Zheng