Sciweavers

4000 search results - page 187 / 800
» Simulation down under
Sort
View
ICCAD
1999
IEEE
66views Hardware» more  ICCAD 1999»
15 years 8 months ago
Timing-safe false path removal for combinational modules
A delay abstraction of a combinational module is a compact representation of the delay information of the module, which carries effective pin-to-pin delay for each primary-input/pr...
Yuji Kukimoto, Robert K. Brayton
CCS
2008
ACM
15 years 5 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ASUNAM
2010
IEEE
15 years 4 months ago
Product Adoption Networks and Their Growth in a Large Mobile Phone Network
—To understand the diffusive spreading of a product in a telecom network, whether the product is a service, handset, or subscription, it can be very useful to study the structure...
Pal Roe Sundsoy, Johannes Bjelland, Geoffrey Canri...
PADS
1997
ACM
15 years 8 months ago
The Dark Side of Risk (what your mother never told you about Time Warp)
This paper is a reminder of the danger of allowing \risk" when synchronizing a parallel discrete-event simulation: a simulation code that runs correctly on a serial machine m...
David M. Nicol, X. Liu
BILDMED
2007
108views Algorithms» more  BILDMED 2007»
15 years 5 months ago
Surgical Cutting on a Multimodal Object Representation
In this paper, we present the design of our surgery simulator under the aspects of multimodal object representation and parallelization on multicore architectures. Special focus is...
Lenka Jerábková, Torsten Kuhlen