Sciweavers

6253 search results - page 1038 / 1251
» Use Case Modeling Guidelines
Sort
View
DATE
2010
IEEE
180views Hardware» more  DATE 2010»
15 years 9 months ago
Reliability- and process variation-aware placement for FPGAs
Abstract—Negative bias temperature instability (NBTI) significantly affects nanoscale integrated circuit performance and reliability. The degradation in threshold voltage (Vth) d...
Assem A. M. Bsoul, Naraig Manjikian, Li Shang
ECRTS
2002
IEEE
15 years 9 months ago
Weakly Hard Real-time Constraints on Controller Area Network
For priority based buses such as CAN, worst case response time analysis is able to determine whether messages always meet their deadlines. This can include system models with boun...
Ian Broster, Guillem Bernat, Alan Burns
IJCNN
2000
IEEE
15 years 8 months ago
Analysis of Fluctuation-Induced Firing in the Presence of Inhibition
This paper examines the computational role of inhibition as it moves towards balancing concurrent excitation using the biologically-inspired Temporal Noisy-Leaky Integrator (TNLI) ...
Chris Christodoulou, Trevor G. Clarkson, John G. T...
PODC
1994
ACM
15 years 8 months ago
A Checkpoint Protocol for an Entry Consistent Shared Memory System
Workstation clusters are becoming an interesting alternative to dedicated multiprocessors. In this environment, the probability of a failure, during an application's executio...
Nuno Neves, Miguel Castro, Paulo Guedes
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
15 years 8 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
« Prev « First page 1038 / 1251 Last » Next »