Sciweavers

348 search results - page 43 / 70
» Experiences in Hardware Trojan Design and Implementation
Sort
View
CAV
2001
Springer
80views Hardware» more  CAV 2001»
14 years 13 days ago
Transformation-Based Verification Using Generalized Retiming
In this paper we present the application of generalized retiming for temporal property checking. Retiming is a structural transformation that relocates registers in a circuit-based...
Andreas Kuehlmann, Jason Baumgartner
DATE
2009
IEEE
119views Hardware» more  DATE 2009»
14 years 1 days ago
Predictive models for multimedia applications power consumption based on use-case and OS level analysis
—Power management at any abstraction level is a key issue for many mobile multimedia and embedded applications. In this paper a design workflow to generate system-level power mo...
Patrick Bellasi, William Fornaciari, David Siorpae...
SIGMETRICS
2010
ACM
180views Hardware» more  SIGMETRICS 2010»
13 years 7 months ago
Route oracle: where have all the packets gone?
Many network-management problems in large backbone networks need the answer to a seemingly simple question: where does a given IP packet, entering the network at a particular plac...
Yaping Zhu, Jennifer Rexford, Subhabrata Sen, Aman...
ECBS
2007
IEEE
119views Hardware» more  ECBS 2007»
14 years 3 months ago
IPOG: A General Strategy for T-Way Software Testing
Most existing work on t-way testing has focused on 2-way (or pairwise) testing, which aims to detect faults caused by interactions between any two parameters. However, faults can ...
Yu Lei, Raghu Kacker, D. Richard Kuhn, Vadim Okun,...
ICCAD
2004
IEEE
155views Hardware» more  ICCAD 2004»
14 years 5 months ago
A flexibility aware budgeting for hierarchical flow timing closure
—In this paper, we present a new block budgeting algorithm which speeds up timing closure in timing driven hierarchical flows. After a brief description of the addressed flow, ...
Olivier Omedes, Michel Robert, Mohammed Ramdani