Sciweavers

3555 search results - page 176 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
135
Voted
WSC
2001
15 years 5 months ago
On the use of fuzzy clustering in construction simulation
This paper presents a methodology that integrates fuzzy clustering and computer simulation and demonstrates its use in modeling earthmoving operations. A simulation system (SimEar...
Mohamed Marzouk, Osama Moselhi
114
Voted
JSA
2006
67views more  JSA 2006»
15 years 3 months ago
Speedup of NULL convention digital circuits using NULL cycle reduction
A NULL Cycle Reduction (NCR) technique is developed to increase the throughput of NULL Convention Logic systems, by reducing the time required to flush complete DATA wavefronts, c...
S. C. Smith
TSMC
2010
14 years 10 months ago
Automated Modeling of Dynamic Reliability Block Diagrams Using Colored Petri Nets
Computer system reliability is conventionally modeled and analyzed using techniques such as fault tree analysis (FTA) and reliability block diagrams (RBD), which provide static rep...
Ryan Robidoux, Haiping Xu, Liudong Xing, MengChu Z...
ACOM
2004
Springer
15 years 9 months ago
Toward a Suite of Performatives Based Upon Joint Intention Theory
Agent communication languages defined using joint intention theory have enjoyed a long research history. A number of performatives have been defined and refined in this literature ...
Marcus J. Huber, Sanjeev Kumar, David McGee
EMSOFT
2004
Springer
15 years 9 months ago
An approach for integrating basic retiming and software pipelining
Basic retiming is an algorithm originally developed for hardware optimization. Software pipelining is a technique proposed to increase instruction-level parallelism for parallel p...
Noureddine Chabini, Wayne Wolf