Sciweavers

1773 search results - page 345 / 355
» The Visibility-Voronoi Complex and Its Applications
Sort
View
ICCD
1995
IEEE
109views Hardware» more  ICCD 1995»
15 years 5 months ago
Verifying the performance of the PCI local bus using symbolic techniques
Symbolic model checking is a successful technique for checking properties of large finite-state systems. This method has been used to verify a number of real-world hardware desig...
Sérgio Vale Aguiar Campos, Edmund M. Clarke...
ISCA
1995
IEEE
120views Hardware» more  ISCA 1995»
15 years 5 months ago
Unconstrained Speculative Execution with Predicated State Buffering
Speculative execution is execution of instructions before it is known whether these instructions should be executed. Compiler-based speculative execution has the potential to achi...
Hideki Ando, Chikako Nakanishi, Tetsuya Hara, Masa...
SC
1995
ACM
15 years 5 months ago
Lazy Release Consistency for Hardware-Coherent Multiprocessors
Release consistency is a widely accepted memory model for distributed shared memory systems. Eager release consistency represents the state of the art in release consistent protoc...
Leonidas I. Kontothanassis, Michael L. Scott, Rica...
GLOBECOM
2009
IEEE
15 years 5 months ago
Compressed Sensing Reception of Bursty UWB Impulse Radio is Robust to Narrow-Band Interference
—We have recently proposed a novel receiver for Ultra-Wide-band Impulse-Radio communication in bursty applications like Wireless Sensor Networks. The receiver, based on the princ...
Anand Oka, Lutz H.-J. Lampe
AAAI
2008
15 years 4 months ago
ARMOR Security for Los Angeles International Airport
Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent f...
James Pita, Manish Jain, Fernando Ordó&ntil...