Sciweavers

10797 search results - page 1994 / 2160
» Robust control applications
Sort
View
TCAD
1998
125views more  TCAD 1998»
15 years 3 months ago
Test-point insertion: scan paths through functional logic
—Conventional scan design imposes considerable area and delay overheads. To establish a scan chain in the test mode, multiplexers at the inputs of flip-flops and scan wires are...
Chih-Chang Lin, Malgorzata Marek-Sadowska, Kwang-T...
SIGCSE
2002
ACM
126views Education» more  SIGCSE 2002»
15 years 3 months ago
Design patterns for games
Designing a two-person game involves identifying the game model to compute the best moves, the user interface (the "view") to play the game, and the controller to coordi...
Dung Zung Nguyen, Stephen B. Wong
133
Voted
SIGMETRICS
2002
ACM
114views Hardware» more  SIGMETRICS 2002»
15 years 3 months ago
Search and replication in unstructured peer-to-peer networks
Decentralized and unstructured peer-to-peer networks such as Gnutella are attractive for certain applications because they require no centralized directories and no precise contro...
Qin Lv, Pei Cao, Edith Cohen, Kai Li, Scott Shenke...
119
Voted
TODAES
1998
68views more  TODAES 1998»
15 years 3 months ago
Specification and verification of pipelining in the ARM2 RISC microprocessor
Abstract State Machines (ASMs) provide a sound mathematical basis for the specification and verification of systems. An application of the ASM methodology to the verification of a ...
James K. Huggins, David Van Campenhout
UMUAI
1998
101views more  UMUAI 1998»
15 years 3 months ago
An Evidential Model for Tracking Initiative in Collaborative Dialogue Interactions
In this paper, we argue for the need to distinguish between task initiative and dialogue initiative, and present an evidential model for tracking shifts in both types of initiativ...
Jennifer Chu-Carroll, Michael K. Brown
« Prev « First page 1994 / 2160 Last » Next »