Sciweavers

1113 search results - page 61 / 223
» Counter Systems for Data Logics
Sort
View
ICCAD
2009
IEEE
118views Hardware» more  ICCAD 2009»
15 years 1 months ago
Memory organization and data layout for instruction set extensions with architecturally visible storage
Present application specific embedded systems tend to choose instruction set extensions (ISEs) based on limitations imposed by the available data bandwidth to custom functional un...
Panagiotis Athanasopoulos, Philip Brisk, Yusuf Leb...
SAFECOMP
2005
Springer
15 years 9 months ago
Control and Data Flow Testing on Function Block Diagrams
As programmable logic controllers(PLCs) have been used in safety-critical applications, testing of PLC applications has become important. The previous PLC-based software testing te...
Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha
STORAGESS
2005
ACM
15 years 9 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
EUSFLAT
2007
183views Fuzzy Logic» more  EUSFLAT 2007»
15 years 5 months ago
Soft Computing in Wireless Sensors Networks
The embedded soft computing approach in wireless sensor networks is suggested. This approach means a combination of embedded fuzzy logic and neural networks models for information...
Alexey N. Averkin, A. G. Belenki
CADE
2010
Springer
15 years 5 months ago
Decreasing Diagrams and Relative Termination
In this paper we use the decreasing diagrams technique to show that a left-linear term rewrite system R is confluent if all its critical pairs are joinable and the critical pair st...
Nao Hirokawa, Aart Middeldorp