Sciweavers

1528 search results - page 236 / 306
» Performance Assertion Checking
Sort
View
TACAS
2001
Springer
135views Algorithms» more  TACAS 2001»
14 years 1 months ago
Implementing a Multi-valued Symbolic Model Checker
Multi-valued logics support the explicit modeling of uncertainty and disagreement by allowing additional truth values in the logic. Such logics can be used for verification of dyn...
Marsha Chechik, Benet Devereux, Steve M. Easterbro...
ASAP
2000
IEEE
90views Hardware» more  ASAP 2000»
14 years 1 months ago
Subword Permutation Instructions for Two-Dimensional Multimedia Processing in MicroSIMD Architectures
MicroSIMD architectures incorporating subword parallelism are very efficient for application-specific media processors as well as for fast multimedia information processing in gen...
Ruby B. Lee
DATE
1999
IEEE
71views Hardware» more  DATE 1999»
14 years 1 months ago
Self Recovering Controller and Datapath Codesign
As society has become more reliant on electronics, the need for fault tolerant ICs has increased. This has resulted in signi cant research into both fault tolerant controller desi...
Samuel Norman Hamilton, Alex Orailoglu, Andre Hert...
POPL
1999
ACM
14 years 1 months ago
Type-Safe Linking and Modular Assembly Language
Linking is a low-level task that is usually vaguely specified, if at all, by language definitions. However, the security of web browsers and other extensible systems depends cru...
Neal Glew, J. Gregory Morrisett
ISCA
1999
IEEE
98views Hardware» more  ISCA 1999»
14 years 1 months ago
Multicast Snooping: A New Coherence Method Using a Multicast Address Network
This paper proposes a new coherence method called "multicast snooping" that dynamically adapts between broadcast snooping and a directory protocol. Multicast snooping is...
E. Ender Bilir, Ross M. Dickson, Ying Hu, Manoj Pl...