Sciweavers

4693 search results - page 793 / 939
» Verifying Hybrid Systems
Sort
View
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
15 years 10 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
ICCD
2001
IEEE
124views Hardware» more  ICCD 2001»
15 years 10 months ago
High-Level Power Modeling of CPLDs and FPGAs
In this paper, we present a high-level power modeling technique to estimate the power consumption of reconfigurable devices such as complex programmable logic devices (CPLDs) and ...
Li Shang, Niraj K. Jha
ICCAD
2008
IEEE
98views Hardware» more  ICCAD 2008»
15 years 10 months ago
Scalable and scalably-verifiable sequential synthesis
This paper describes an efficient implementation of an effective sequential synthesis operation that uses induction to detect and merge sequentially-equivalent nodes. State-encodi...
Alan Mishchenko, Michael L. Case, Robert K. Brayto...
ICCAD
2002
IEEE
176views Hardware» more  ICCAD 2002»
15 years 10 months ago
High capacity and automatic functional extraction tool for industrial VLSI circuit designs
In this paper we present an advanced functional extraction tool for automatic generation of high-level RTL from switch-level circuit netlist representation. The tool is called FEV...
Sasha Novakovsky, Shy Shyman, Ziyad Hanna
IUI
2009
ACM
15 years 9 months ago
Subobject detection through spatial relationships on mobile phones
We present a novel image classification technique for detecting multiple objects (called subobjects) in a single image. In addition to image classifiers, we apply spatial relati...
Benjamin Brombach, Erich Bruns, Oliver Bimber