Sciweavers

1783 search results - page 242 / 357
» Provenance and Data Synchronization
Sort
View
ISLPED
1999
ACM
236views Hardware» more  ISLPED 1999»
15 years 8 months ago
Modeling and automating selection of guarding techniques for datapath elements
While guarded evaluation has proven an effective energy saving technique in arithmetic circuits, good methodologies do not exist for determining when and how to guard for maximal ...
William E. Dougherty, Donald E. Thomas
HICSS
1999
IEEE
88views Biometrics» more  HICSS 1999»
15 years 8 months ago
A Cache Architecture for Modernizing the Usenet Infrastructure
Current Internet users see the combination of World-wide Web (WWW) and electronic mail as a synonym for the Internet. While WWW is excellent for easy and fast dissemination of inf...
Thomas Gschwind, Manfred Hauswirth
ISCC
1999
IEEE
127views Communications» more  ISCC 1999»
15 years 8 months ago
A Modular Location-Aware Service and Application Platform
Location-Aware applications for supporting the mobile user as well as logistics of movable objects have proven significant relevance for future telecommunication and computing. Ba...
Tom Pfeifer, Radu Popescu-Zeletin
FMCAD
1998
Springer
15 years 8 months ago
Combining Symbolic Model Checking with Uninterpreted Functions for Out-of-Order Processor Verification
We present a new approach to the verification of hardware systems with data dependencies using temporal logic symbolic model checking. As a benchmark we take Tomasulo's algori...
Sergey Berezin, Armin Biere, Edmund M. Clarke, Yun...
VRST
1997
ACM
15 years 8 months ago
Real-time vision-based camera tracking for augmented reality applications
Augmented reality deals with the problem of dynamically augmenting or enhancing (images or live video of) the real world with computer generated data (e.g., graphics of virtual ob...
Dieter Koller, Gudrun Klinker, Eric Rose, David E....