Sciweavers

1116 search results - page 192 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
POPL
2003
ACM
14 years 8 months ago
Selective memoization
We present a framework for applying memoization selectively. The framework provides programmer control over equality, space usage, and identification of precise dependences so tha...
Umut A. Acar, Guy E. Blelloch, Robert Harper
ISQED
2010
IEEE
135views Hardware» more  ISQED 2010»
14 years 2 months ago
Signal probability control for relieving NBTI in SRAM cells
—Negative Bias Temperature Instability (NBTI) is one of the major reliability problems in advanced technologies. NBTI causes threshold voltage degradation in a PMOS transistor wh...
Yuji Kunitake, Toshinori Sato, Hiroto Yasuura
AINA
2009
IEEE
14 years 2 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu
DATE
2008
IEEE
122views Hardware» more  DATE 2008»
14 years 2 months ago
Simulation-Directed Invariant Mining for Software Verification
With the advance of SAT solvers, transforming a software program to a propositional formula has generated much interest for bounded model checking of software in recent years. How...
Xueqi Cheng, Michael S. Hsiao
ICCAD
2007
IEEE
105views Hardware» more  ICCAD 2007»
14 years 2 months ago
Victim alignment in crosstalk aware timing analysis
Modeling the effect of coupling noise on circuit delay is a key issue in static timing analysis (STA) and involves the “victimaggressor alignment” problem. As delay-noise depe...
Ravikishore Gandikota, Kaviraj Chopra, David Blaau...