Sciweavers

5344 search results - page 346 / 1069
» Privacy-Preserving Set Operations
Sort
View
156
Voted
ICCAD
1994
IEEE
137views Hardware» more  ICCAD 1994»
15 years 8 months ago
Dynamic scheduling and synchronization synthesis of concurrent digital systems under system-level constraints
We present in this paper a novel control synthesis technique for system-level specifications that are better described as a set of concurrent synchronous descriptions, their synch...
Claudionor José Nunes Coelho Jr., Giovanni ...
116
Voted
ICCD
1994
IEEE
142views Hardware» more  ICCD 1994»
15 years 8 months ago
Grammar-Based Optimization of Synthesis Scenarios
Systems for multi-level logic optimization are usually based on a set of specialized, loosely-related transformations which work on a network representation. The sequence of trans...
Andreas Kuehlmann, Lukas P. P. P. van Ginneken
CISM
1993
149views GIS» more  CISM 1993»
15 years 8 months ago
The Weak Instance Model
The weak instance model is a framework to consider the relations in a database as a whole, regardless of the way attributes are grouped in the individual relations. Queries and upd...
Paolo Atzeni, Riccardo Torlone
DAC
1993
ACM
15 years 8 months ago
On Area/Depth Trade-off in LUT-Based FPGA Technology Mapping
In this paper we study the area and depth trade-off in LUT based FPGA technology mapping. Starting from a depth-optimal mapping solution, we perform a number of depth relaxation o...
Jason Cong, Yuzheng Ding
DAC
1994
ACM
15 years 8 months ago
Clock Period Optimization During Resource Sharing and Assignment
- This paper analyzes the effect of resource sharing and assignment on the clock period of the synthesized circuit. We focus on behavioral specifications with mutually exclusive pa...
Subhrajit Bhattacharya, Sujit Dey, Franc Brglez