Sciweavers

1629 search results - page 64 / 326
» Infeasible Code Detection
Sort
View
SIPS
2007
IEEE
14 years 4 months ago
MIMO Detector Based on Viterbi Algorithm
: - Suboptimal detectors of multiple-input multiple-output (MIMO) have been studied because the implementation of the optimum detector, the maximum-likelihood (ML) detector, has so...
Jin Lee, Sin-Chong Park
ISCA
2002
IEEE
102views Hardware» more  ISCA 2002»
14 years 3 months ago
Implementing Optimizations at Decode Time
The number of pipeline stages separating dynamic instruction scheduling from instruction execution has increased considerably in recent out-of-order microprocessor implementations...
Ilhyun Kim, Mikko H. Lipasti
ISSS
1999
IEEE
120views Hardware» more  ISSS 1999»
14 years 2 months ago
RTGEN: An Algorithm for Automatic Generation of Reservation Tables from Architectural Descriptions
Abstract--Reservation Tables (RTs) have long been used to detect conflicts between operations that simultaneously access the same architectural resource. Traditionally, these RTs h...
Peter Grun, Ashok Halambi, Nikil D. Dutt, Alexandr...
ICST
2010
IEEE
13 years 8 months ago
Automated Test Data Generation on the Analyses of Feature Models: A Metamorphic Testing Approach
A Feature Model (FM) is a compact representation of all the products of a software product line. The automated extraction of information from FMs is a thriving research topic invo...
Sergio Segura, Robert M. Hierons, David Benavides,...
ICSE
2009
IEEE-ACM
14 years 5 months ago
ClemanX: Incremental clone detection tool for evolving software
Recent research results have shown more benefits of the management of code clones, rather than detecting and removing them. However, existing clone management approaches are stil...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...