Sciweavers

1620 search results - page 109 / 324
» Use Case Level Pointcuts
Sort
View
132
Voted
DT
2000
88views more  DT 2000»
15 years 3 months ago
Postsilicon Validation Methodology for Microprocessors
f abstraction as applicable to break the problem's complexity, and innovating better techniques to address complexity of new microarchitectural features. Validation techniques...
Hemant G. Rotithor
123
Voted
WSC
2001
15 years 4 months ago
Choosing among seven bases
In this paper, the selection of a BASE Case was every bit as important as the simulation itself. The production team had been familiar with simulations and had used their results ...
Stuart Gittlitz
SIGADA
2004
Springer
15 years 8 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
TSP
2010
14 years 10 months ago
Beamforming and rate allocation in MISO cognitive radio networks
We consider decentralized multiantenna cognitive radio networks where the secondary (cognitive) users are granted simultaneous spectrum access along with the license-holding (prima...
Ali Tajer, Narayan Prasad, Xiaodong Wang
122
Voted
DSN
2007
IEEE
15 years 9 months ago
On the Cost of Modularity in Atomic Broadcast
Modularity is a desirable property of complex software systems, since it simplifies code reuse, verification, maintenance, etc. However, the use of loosely coupled modules intro...
Olivier Rütti, Sergio Mena, Richard Ekwall, A...