Sciweavers

2662 search results - page 372 / 533
» Tools Demonstrations
Sort
View
119
Voted
ICCAD
1995
IEEE
88views Hardware» more  ICCAD 1995»
15 years 8 months ago
Estimation and bounding of energy consumption in burst-mode control circuits
This paper describes two techniques to quantify energy consumption of burst-modeasynchronous(clock-less)controlcircuits. The circuit specifications consideredare extended burst-m...
Peter A. Beerel, Kenneth Y. Yun, Steven M. Nowick,...
SDB
1995
95views Database» more  SDB 1995»
15 years 8 months ago
Semantics of Database Transformations
Database transformations arise in many di erent settings including database integration, evolution of database systems, and implementing user views and data-entry tools. This paper...
Peter Buneman, Susan B. Davidson, Anthony Kosky
ISMVL
2010
IEEE
166views Hardware» more  ISMVL 2010»
15 years 8 months ago
Non-deterministic Multi-valued Logics--A Tutorial
Non-deterministic multi-valued matrices (Nmatrices) are a new, fruitful and quickly expanding field of research first introduced a few years ago. Since then it has been rapidly ...
Arnon Avron, Anna Zamansky
CDC
2009
IEEE
125views Control Systems» more  CDC 2009»
15 years 8 months ago
Partial feedback control of quantum systems using probabilistic fuzzy estimator
Abstract— A partial feedback control scheme with a probabilistic fuzzy estimator (PFE) is presented for the robust control of quantum systems. In this scheme, a probabilistic fuz...
Chunlin Chen, Gerasimos G. Rigatos, Daoyi Dong, J....
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
15 years 7 months ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...