Sciweavers

1240 search results - page 239 / 248
» Composition with Target Constraints
Sort
View
INEX
2004
Springer
14 years 3 months ago
Hybrid XML Retrieval Revisited
Abstract. The widespread adoption of XML necessitates structureaware systems that can effectively retrieve information from XML document collections. This paper reports on the par...
Jovan Pehcevski, James A. Thom, Seyed M. M. Tahagh...
ITC
2003
IEEE
148views Hardware» more  ITC 2003»
14 years 3 months ago
HyAC: A Hybrid Structural SAT Based ATPG for Crosstalk
As technology evolves into the deep sub-micron era, signal integrity problems are growing into a major challenge. An important source of signal integrity problems is the crosstalk...
Xiaoliang Bai, Sujit Dey, Angela Krstic
SASN
2003
ACM
14 years 3 months ago
Location-based pairwise key establishments for static sensor networks
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
Donggang Liu, Peng Ning
DATE
2010
IEEE
113views Hardware» more  DATE 2010»
14 years 2 months ago
PM-COSYN: PE and memory co-synthesis for MPSoCs
—Multi-Processor System-on-Chips (MPSoCs) exploit task-level parallelism to achieve high computation throughput, but concurrent memory accesses from multiple PEs may cause memory...
Yi-Jung Chen, Chia-Lin Yang, Po-Han Wang
ISCA
2010
IEEE
219views Hardware» more  ISCA 2010»
14 years 2 months ago
Using hardware vulnerability factors to enhance AVF analysis
Fault tolerance is now a primary design constraint for all major microprocessors. One step in determining a processor’s compliance to its failure rate target is measuring the Ar...
Vilas Sridharan, David R. Kaeli