Sciweavers

1516 search results - page 136 / 304
» The Increasing Nvalue Constraint
Sort
View
WCRE
2006
IEEE
15 years 4 months ago
The Experimental Paradigm in Reverse Engineering: Role, Challenges, and Limitations
In many areas of software engineering, empirical studies are playing an increasingly important role. This stems from the fact that software technologies are often based on heurist...
Lionel C. Briand
ADVIS
2006
Springer
15 years 4 months ago
Checking Violation Tolerance of Approaches to Database Integrity
A hitherto unquestioned assumption made by all methods for integrity checking has been that the database satisfies its constraints before each update. This consistency assumption ...
Hendrik Decker, Davide Martinenghi
ISLPED
2006
ACM
129views Hardware» more  ISLPED 2006»
15 years 4 months ago
Variation-driven device sizing for minimum energy sub-threshold circuits
Sub-threshold operation is a compelling approach for energyconstrained applications, but increased sensitivity to variation must be mitigated. We explore variability metrics and t...
Joyce Kwong, Anantha P. Chandrakasan
IWCMC
2006
ACM
15 years 4 months ago
Security aspects of inter-satellite links using neural networks
This paper presents a neural network model for routing in the space segment of a Satellite Personal Communication System. At first, a proper energy function is constructed from th...
Peter P. Stavroulakis, Ioannis Dimou, Harilaos G. ...
DATE
2005
IEEE
118views Hardware» more  DATE 2005»
15 years 3 months ago
Energy- and Performance-Driven NoC Communication Architecture Synthesis Using a Decomposition Approach
In this paper, we present a methodology for customized communication architecture synthesis that matches the communication requirements of the target application. This is an impor...
Ümit Y. Ogras, Radu Marculescu