Sciweavers

2652 search results - page 309 / 531
» Privacy-preserving linear programming
Sort
View
VLSID
2007
IEEE
160views VLSI» more  VLSID 2007»
16 years 3 months ago
Spectral RTL Test Generation for Microprocessors
We introduce a novel method of test generation for microprocessors at the RTL using spectral methods. Test vectors are generated for RTL faults, which are the stuck-at faults on i...
Nitin Yogi, Vishwani D. Agrawal
124
Voted
VLSID
2002
IEEE
130views VLSI» more  VLSID 2002»
16 years 3 months ago
Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks
In preemptive real-time systems, a tighter estimate of the Worst Case Response Time(WCRT) of the tasks can be obtained if the layout of the tasks in memory is included in the esti...
Anupam Datta, Sidharth Choudhury, Anupam Basu
120
Voted
ICALP
2009
Springer
16 years 3 months ago
B-Treaps: A Uniquely Represented Alternative to B-Trees
We present the first uniquely represented data structure for an external memory model of computation, a B-tree analogue called a B-treap. Uniquely represented data structures repre...
Daniel Golovin
ICSE
2004
IEEE-ACM
16 years 3 months ago
Runtime Verification of Statechart Implementations
Our paper introduces a runtime verification framework for concurrent monitoring of applications specified by UML statecharts. The approach offers a considerable degree of granulari...
Gergely Pintér, István Majzik
EWSN
2006
Springer
16 years 3 months ago
Power Management for Bluetooth Sensor Networks
Low power is a primary concern in the field of wireless sensor networks. Bluetooth has often been labeled as an inappropriate technology in this field due to its high power consump...
Luca Negri, Lothar Thiele