Sciweavers

813 search results - page 45 / 163
» Pipeline-centric provenance model
Sort
View
ASPLOS
2006
ACM
14 years 2 months ago
Portability events: a programming model for scalable system infrastructures
Clustered Objects (COs) [1] have been proven to be an effective ion for improving scalability of systems software [2, 3]. But can we devise a programming model that would allow CO...
Chris Matthews, Yvonne Coady, Jonathan Appavoo
FMCAD
1998
Springer
14 years 1 months ago
Combining Symbolic Model Checking with Uninterpreted Functions for Out-of-Order Processor Verification
We present a new approach to the verification of hardware systems with data dependencies using temporal logic symbolic model checking. As a benchmark we take Tomasulo's algori...
Sergey Berezin, Armin Biere, Edmund M. Clarke, Yun...
ICMCS
2010
IEEE
176views Multimedia» more  ICMCS 2010»
13 years 7 months ago
LCD motion blur modeling and simulation
Liquid crystal display (LCD) devices are well known to have slow response due to the physical limitations of the liquid crystals. Therefore, fast moving objects in a scene are oft...
Stanley H. Chan, Truong Q. Nguyen
WEBI
2007
Springer
14 years 3 months ago
OOPS: User Modeling Method for Task Oriented Mobile Internet Services
Growth in the mobile services industry has remarkably increased in the number of mobile services provided, and present methods of service provision have proven insufficient to gui...
Munehiko Sasajima, Yoshinobu Kitamura, Takefumi Na...
DSD
2006
IEEE
93views Hardware» more  DSD 2006»
14 years 3 months ago
High-Level Decision Diagram based Fault Models for Targeting FSMs
Recently, a number of works have been published on implementing assignment decision diagram models combined with SAT methods to address register-transfer level test pattern genera...
Jaan Raik, Raimund Ubar, Taavi Viilukas