Sciweavers

2945 search results - page 514 / 589
» Designing and Implementing Malicious Hardware
Sort
View
ASPDAC
2005
ACM
73views Hardware» more  ASPDAC 2005»
15 years 10 months ago
An-OARSMan: obstacle-avoiding routing tree construction with good length performance
- Routing is one of the important steps in VLSI/ULSI physical design. The rectilinear Steiner minimum tree (RSMT) construction is an essential part of routing. Since macro cells, I...
Yu Hu, Tong Jing, Xianlong Hong, Zhe Feng 0002, Xi...
UIST
2005
ACM
15 years 10 months ago
PapierCraft: a command system for interactive paper
Knowledge workers use paper extensively for document reviewing and note-taking due to its versatility and simplicity of use. As users annotate printed documents and gather notes, ...
Chunyuan Liao, François Guimbretière...
HVC
2005
Springer
97views Hardware» more  HVC 2005»
15 years 10 months ago
An Extensible Open-Source Compiler Infrastructure for Testing
Testing forms a critical part of the development process for large-scale software, and there is growing need for automated tools that can read, represent, analyze, and transform th...
Daniel J. Quinlan, Shmuel Ur, Richard W. Vuduc
SENSYS
2004
ACM
15 years 10 months ago
Sensor network-based countersniper system
An ad-hoc wireless sensor network-based system is presented that detects and accurately locates shooters even in urban environments. The system consists of a large number of cheap...
Gyula Simon, Miklós Maróti, Á...
DFT
2003
IEEE
100views VLSI» more  DFT 2003»
15 years 9 months ago
Scan-Based BIST Diagnosis Using an Embedded Processor
For system-on-chip designs that contain an embedded processor, this paper present a software based diagnosis scheme that can make use of the processor to aid in diagnosis in a sca...
Kedarnath J. Balakrishnan, Nur A. Touba