Sciweavers

128 search results - page 7 / 26
» A Detailed Analysis of SAFER K
Sort
View
MR
2002
100views Robotics» more  MR 2002»
13 years 7 months ago
No-flow underfill flip chip assembly--an experimental and modeling analysis
In the flip-chip assembly process, no-flow underfill materials have a particular advantage over traditional underfill: the application and curing of the former can be undertaken b...
Hua Lu 0003, K. C. Hung, Stoyan Stoyanov, Chris Ba...
DATE
2006
IEEE
84views Hardware» more  DATE 2006»
14 years 1 months ago
Vulnerability analysis of L2 cache elements to single event upsets
Memory elements are the most vulnerable system component to soft errors. Since memory elements in cache arrays consume a large fraction of the die in modern microprocessors, the p...
Hossein Asadi, Vilas Sridharan, Mehdi Baradaran Ta...
LCN
1994
IEEE
13 years 11 months ago
The Ethernet Capture Effect: Analysis and Solution
We analyze the behavior of the Ethernet in networks with a small number of active stations, and describe what is known as the Ethernet capture effect, where a station transmits co...
K. K. Ramakrishnan, Henry Yang
CPHYSICS
2006
95views more  CPHYSICS 2006»
13 years 7 months ago
Efficient data processing and quantum phenomena: Single-particle systems
We study the relation between the acquisition and analysis of data and quantum theory using a probabilistic and deterministic model for photon polarizers. We introduce criteria fo...
H. De Raedt, Koen De Raedt, K. Michielsen, S. Miya...
ISOLA
2010
Springer
13 years 5 months ago
Analysing Message Sequence Graph Specifications
We give a detailed construction of a finite-state transition system for a com-connected Message Sequence Graph. Though this result is fairly well-known in the literature there has...
Joy Chakraborty, Deepak D'Souza, K. Narayan Kumar