Sciweavers

1329 search results - page 162 / 266
» Constraint-based model synthesis
Sort
View
MIS
2006
Springer
159views Multimedia» more  MIS 2006»
15 years 4 months ago
Personalized avatars for mobile entertainment
LiveMail is a prototype system that allows mobile subscribers to communicate using personalized 3D face models created from images taken by their phone cameras. The user takes a s...
Tomislav Kosutic, Miran Mosmondor, Ivan Andrisek, ...
ICCAD
2001
IEEE
153views Hardware» more  ICCAD 2001»
16 years 1 months ago
The Sizing Rules Method for Analog Integrated Circuit Design
This paper presents the sizing rules method for analog CMOS circuit design that consists of: first, the development of a hierarchical library of transistor pair groups as basic b...
Helmut E. Graeb, Stephan Zizala, Josef Eckmueller,...
127
Voted
IH
2004
Springer
15 years 10 months ago
Information Hiding in Finite State Machine
In this paper, we consider how to hide information into finite state machine (FSM), one of the popular computation models. The key advantage of hiding information in FSM is that t...
Lin Yuan, Gang Qu
DAC
2009
ACM
15 years 9 months ago
Non-cycle-accurate sequential equivalence checking
We present a novel technique for Sequential Equivalence Checking (SEC) between non-cycle-accurate designs. The problem is routinely encountered in verifying the correctness of a s...
Pankaj Chauhan, Deepak Goyal, Gagan Hasteer, Anmol...
165
Voted
ICCAD
2007
IEEE
165views Hardware» more  ICCAD 2007»
15 years 8 months ago
Automated refinement checking of concurrent systems
Stepwise refinement is at the core of many approaches to synthesis and optimization of hardware and software systems. For instance, it can be used to build a synthesis approach for...
Sudipta Kundu, Sorin Lerner, Rajesh Gupta