Sciweavers

12478 search results - page 2453 / 2496
» Secure Interaction Design
Sort
View
DAC
1998
ACM
15 years 6 months ago
Synthesis of Power-Optimized and Area-Optimized Circuits from Hierarchical Behavioral Descriptions
We present a technique for synthesizing power- as well as area-optimized circuits from hierarchical data flow graphs under throughput constraints. We allow for the use of complex...
Ganesh Lakshminarayana, Niraj K. Jha
CAV
1998
Springer
175views Hardware» more  CAV 1998»
15 years 6 months ago
An ACL2 Proof of Write Invalidate Cache Coherence
As a pedagogical exercise in ACL2, we formalize and prove the correctness of a write invalidate cache scheme. In our formalization, an arbitrary number of processors, each with its...
J. Strother Moore
SIGGRAPH
1998
ACM
15 years 6 months ago
Rendering Synthetic Objects into Real Scenes: Bridging Traditional and Image-based Graphics with Global Illumination and High Dy
We present a method that uses measured scene radiance and global illumination in order to add new objects to light-based models with correct lighting. The method uses a high dynam...
Paul E. Debevec
ECAI
1998
Springer
15 years 6 months ago
What You See Is What You Meant: direct knowledge editing with natural language feedback
Many kinds of knowledge-based system would be easier to develop and maintain if domain experts (as opposed to knowledge engineers) were in a position to define and edit the knowled...
Richard Power, Donia Scott, Roger Evans
ICSE
1998
IEEE-ACM
15 years 6 months ago
Non-Intrusive Object Introspection in C++: Architecture and Application
We describe the design and implementation of system architecture to support object introspection in C++. In this system, information is collected by parsing class declarations, an...
Tyng-Ruey Chuang, Y. S. Kuo, Chien-Min Wang
« Prev « First page 2453 / 2496 Last » Next »