Sciweavers

8228 search results - page 1413 / 1646
» Structural Logical Relations
Sort
View
92
Voted
ICCAD
1999
IEEE
108views Hardware» more  ICCAD 1999»
15 years 5 months ago
Copy detection for intellectual property protection of VLSI designs
We give the first study of copy detection techniques for VLSI CAD applications; these techniques are complementary to previous watermarking-based IP protection methods in finding ...
Andrew B. Kahng, Darko Kirovski, Stefanus Mantik, ...
106
Voted
IEEEPACT
1999
IEEE
15 years 5 months ago
The Effect of Program Optimization on Trace Cache Efficiency
Trace cache, an instruction fetch technique that reduces taken branch penalties by storing and fetching program instructions in dynamic execution order, dramatically improves inst...
Derek L. Howard, Mikko H. Lipasti
DSOM
1999
Springer
15 years 5 months ago
Derivation of Backup Service Management Applications from Service and System Models
The backup of large data sets is preferably performed automatically outside of regular working hours. In highly structured computer networks, however, faults and exceptions may rel...
Ingo Lück, Marcus Schönbach, Arnulf Mest...
COMPSAC
1998
IEEE
15 years 5 months ago
The Essence of the Visitor Pattern
Abstract. For object-oriented programming, the Visitor pattern enables the definition of a new operation on an object structure without changing the classes of the objects. The pri...
Jens Palsberg, C. Barry Jay
101
Voted
DATE
1998
IEEE
103views Hardware» more  DATE 1998»
15 years 5 months ago
Efficient Encoding Schemes for Symbolic Analysis of Petri Nets
Petri nets are a graph-based formalism appropriate to model concurrentsystems such as asynchronouscircuits or network protocols. Symbolic techniques based on Binary Decision Diagr...
Enric Pastor, Jordi Cortadella
« Prev « First page 1413 / 1646 Last » Next »