Sciweavers

92 search results - page 5 / 19
» Mermaid: modelling and evaluation research in MIMD architect...
Sort
View
WSC
2001
13 years 8 months ago
A taxonomy of a living model of the enterprise
A designer has a choice of many models, methods, frameworks, and architectures. There is little consistency between these terms among researchers. Some of the most widely used arc...
Larry Whitman, Kartik Ramachandran, Vikram Ketkar
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 1 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
EUROMICRO
2006
IEEE
14 years 1 months ago
Moving Architectural Description from Under the Technology Lamppost
Software architecture description languages (ADLs) were a particularly active research area in the 1990s. In 2000, we published an extensive study of existing ADLs, which has serv...
Nenad Medvidovic
DAC
2003
ACM
14 years 8 months ago
Behavioral consistency of C and verilog programs using bounded model checking
We present an algorithm that checks behavioral consistency between an ANSI-C program and a circuit given in Verilog using Bounded Model Checking. Both the circuit and the program ...
Edmund M. Clarke, Daniel Kroening, Karen Yorav
ICASSP
2010
IEEE
13 years 7 months ago
A survey of implementation efforts and experimental design for cooperative communications
Design and analysis of cooperative communication schemes based upon modeling and simulation exist in large quantities in the research literature. Despite this fact, there have bee...
Glenn Bradford, J. Nicholas Laneman