Sciweavers

438 search results - page 66 / 88
» constraints 1998
Sort
View
IDEAS
1998
IEEE
112views Database» more  IDEAS 1998»
15 years 1 months ago
Transitive Dependencies in Transaction Closures
Complex applications consist of a large set of transactions which are interrelated. There are different kinds of dependencies among transactions of a complex application, e.g. ter...
Kerstin Schwarz, Can Türker, Gunter Saake
IEEEPACT
1998
IEEE
15 years 1 months ago
A Matrix-Based Approach to the Global Locality Optimization Problem
Global locality analysis is a technique for improving the cache performance of a sequence of loop nests through a combination of loop and data layout optimizations. Pure loop tran...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...
ISCA
1998
IEEE
137views Hardware» more  ISCA 1998»
15 years 1 months ago
Accurate Indirect Branch Prediction
Indirect branch prediction is likely to become increasingly important in the future because indirect branches occur more frequently in object-oriented programs. With misprediction ...
Karel Driesen, Urs Hölzle
ISORC
1998
IEEE
15 years 1 months ago
The Time-Triggered Architecture
The Time-Triggered Architecture (TTA) provides a computing infrastructure for the design and implementation of dependable distributed embedded systems. A large real-time applicatio...
Hermann Kopetz
ITC
1998
IEEE
114views Hardware» more  ITC 1998»
15 years 1 months ago
BETSY: synthesizing circuits for a specified BIST environment
This paper presents a logic synthesis tool called BETSY (BIST Environment Testable Synthesis) for synthesizing circuits that achieve complete (100%)fault coverage in a user specif...
Zhe Zhao, Bahram Pouya, Nur A. Touba