Sciweavers

647 search results - page 42 / 130
» Generation of BDDs from hardware algorithm descriptions
Sort
View
DAC
1999
ACM
14 years 7 days ago
Common-Case Computation: A High-Level Technique for Power and Performance Optimization
This paper presents a design methodology, called common-case computation (CCC), and new design automation algorithms for optimizing power consumption or performance. The proposed ...
Ganesh Lakshminarayana, Anand Raghunathan, Kamal S...
ECCV
2004
Springer
14 years 1 months ago
CT from an Unmodified Standard Fluoroscopy Machine Using a Non-reproducible Path
3D reconstruction from image data is required in many medical procedures. Recently, the use of fluoroscopy data to generate these 3D models has been explored. Most existing methods...
Chris Baker, Christian Debrunner, Mohamed Mahfouz,...
CAV
2010
Springer
161views Hardware» more  CAV 2010»
13 years 11 months ago
Directed Proof Generation for Machine Code
We present the algorithms used in MCVETO (Machine-Code VErification TOol), a tool to check whether a stripped machinecode program satisfies a safety property. The verification p...
Aditya V. Thakur, Junghee Lim, Akash Lal, Amanda B...
ACSC
2001
IEEE
13 years 11 months ago
Starting with Termination: A Methodology for Building Distributed Garbage Collection Algorithms
We propose an effective methodology in which a distributed garbage collector may be derived from a distributed termination algorithm and a centralized garbage collector in a manne...
Stephen M. Blackburn, J. Eliot B. Moss, Richard L....
ESANN
1997
13 years 9 months ago
Extraction of crisp logical rules using constrained backpropagation networks
Two recently developed methods for extraction of crisp logical rules from neural networks trained with backpropagation algorithm are compared. Both methods impose constraints on th...
Wlodzislaw Duch, Rafal Adamczak, Krzysztof Grabcze...