Sciweavers

1008 search results - page 41 / 202
» A cis-regulatory logic simulator
Sort
View
DAC
2003
ACM
14 years 9 months ago
Automatic trace analysis for logic of constraints
Verification of system designs continues to be a major challenge today. Simulation remains the primary tool for making sure that implementations perform as they should. We present...
Xi Chen, Harry Hsieh, Felice Balarin, Yosinori Wat...
FUIN
2008
88views more  FUIN 2008»
13 years 8 months ago
Validating Behavioral Component Interfaces in Rewriting Logic
Many distributed applications can be understood in terms of components interacting in an open environment such as the Internet. Open environments are subject to change in unpredic...
Einar Broch Johnsen, Olaf Owe, Arild B. Torjusen
IWCMC
2006
ACM
14 years 2 months ago
A simulation study of a MAC layer protocol for wireless networks with asymmetric links
— Asymmetric links are common in wireless networks for a variety of physical, logical, operational, and legal considerations. An asymmetric link supports uni-directional communic...
Guoqiang Wang, Damla Turgut, Ladislau Böl&oum...
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
14 years 2 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
PVM
2004
Springer
14 years 2 months ago
Numerical Simulations on PC Graphics Hardware
On recent PC graphics cards, fully programmable parallel geometry and pixel units are available providing powerful instruction sets to perform arithmetic and logical operations. In...
Jens Krüger, Thomas Schiwietz, Peter Kipfer, ...