Sciweavers

647 search results - page 91 / 130
» Generation of BDDs from hardware algorithm descriptions
Sort
View
CAV
2001
Springer
119views Hardware» more  CAV 2001»
14 years 12 days ago
Certifying Model Checkers
Model Checking is an algorithmic technique to determine whether a temporal property holds of a program. For linear time properties, a model checker produces a counterexample comput...
Kedar S. Namjoshi
IWMM
2000
Springer
82views Hardware» more  IWMM 2000»
13 years 11 months ago
The Case for Profile-Directed Selection of Garbage Collectors
Many garbage-collected systems use a single garbage collection algorithm across all applications. It has long been known that this can produce poor performance on applications for...
Robert P. Fitzgerald, David Tarditi
ISCAS
2003
IEEE
169views Hardware» more  ISCAS 2003»
14 years 1 months ago
Efficient implementation of complex exponentially-modulated filter banks
In Exponentially-ModulatedFilter Bank (EMFB) the complex subfilters are generated from a real-valued prototype filter by multiplying the filter impulse response with complex expon...
Juuso Alhava, Ari Viholainen, Markku Renfors
CAV
2009
Springer
132views Hardware» more  CAV 2009»
14 years 8 months ago
Image Computation for Polynomial Dynamical Systems Using the Bernstein Expansion
This paper is concerned with the problem of computing the image of a set by a polynomial function. Such image computations constitute a crucial component in typical tools for set-b...
Thao Dang, David Salinas
WWW
2009
ACM
14 years 8 months ago
Less talk, more rock: automated organization of community-contributed collections of concert videos
We describe a system for synchronization and organization of user-contributed content from live music events. We start with a set of short video clips taken at a single event by m...
Lyndon S. Kennedy, Mor Naaman