Sciweavers

3134 search results - page 107 / 627
» simulation 2010
Sort
View
FAC
2010
121views more  FAC 2010»
15 years 20 days ago
Blaming the client: on data refinement in the presence of pointers
Data refinement is a common approach to reasoning about programs, based on establishing that te program indeed satisfies all the required properties imposed by an intended abstract...
Ivana Filipovic, Peter W. O'Hearn, Noah Torp-Smith...
ENTCS
2007
91views more  ENTCS 2007»
15 years 3 months ago
Timed Concurrent Constraint Programming for Analysing Biological Systems
In this paper we present our rst approach to model and verify biological systems using ntcc, a concurrent constraint process calculus. We argue that the partial information const...
Julian Gutierrez, Jorge A. Pérez, Camilo Ru...
100
Voted
TC
2010
14 years 10 months ago
FPGA Designs with Optimized Logarithmic Arithmetic
Using a general polynomial approximation approach, we present an arithmetic library generator for the logarithmic number system (LNS). The generator produces optimized LNS arithmet...
Haohuan Fu, Oskar Mencer, Wayne Luk
120
Voted
TCAD
2010
98views more  TCAD 2010»
14 years 10 months ago
Statistical Modeling With the PSP MOSFET Model
PSP and the backward propagation of variance (BPV) method are used to characterize the statistical variations of metal-oxide-semiconductor field effect transistors (MOSFETs). BPV s...
Xin Li, Colin C. McAndrew, Weimin Wu, Samir Chaudh...
CMS
2006
175views Communications» more  CMS 2006»
15 years 4 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin