Sciweavers

329 search results - page 45 / 66
» Elliptic Control by Penalty Techniques with Control Reductio...
Sort
View
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
14 years 1 months ago
Mechanisms for bounding vulnerabilities of processor structures
Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance r...
Niranjan Soundararajan, Angshuman Parashar, Anand ...
DAC
2006
ACM
14 years 1 months ago
Buffer memory optimization for video codec application modeled in Simulink
Reduction of the on-chip memory size is a key issue in video codec system design. Because video codec applications involve complex algorithms that are both data-intensive and cont...
Sang-Il Han, Xavier Guerin, Soo-Ik Chae, Ahmed Ami...
HYBRID
2000
Springer
13 years 11 months ago
Towards Procedures for Systematically Deriving Hybrid Models of Complex Systems
Abstract. In many cases, complex system behaviors are naturally modeled as nonlinear differential equations. However, these equations are often hard to analyze because of "sti...
Pieter J. Mosterman, Gautam Biswas
FORMATS
2008
Springer
13 years 9 months ago
Average-Price and Reachability-Price Games on Hybrid Automata with Strong Resets
Abstract. We introduce and study hybrid automata with strong resets. They generalize o-minimal hybrid automata, a class of hybrid automata which allows modeling of complex continuo...
Patricia Bouyer, Thomas Brihaye, Marcin Jurdzinski...
COMCOM
2010
136views more  COMCOM 2010»
13 years 7 months ago
D-MORE: Dynamic mesh-based overlay peer-to-peer infrastructure
Traditionally, Internet Service Providers (ISPs) have to interconnect with content providers to provide network services to customers. The current business model that connectivity...
Jun Lei, Xiaoming Fu, Dieter Hogrefe