Sciweavers

248 search results - page 27 / 50
» Test exploration and validation using transaction level mode...
Sort
View
128
Voted
FORTE
2008
15 years 5 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
146
Voted
SEUS
2008
IEEE
15 years 10 months ago
Model Based Synthesis of Embedded Software
Abstract— This paper presents SW synthesis using Embedded System Environment (ESE), a tool set for design of multicore embedded systems. We propose a classification of multicore...
Daniel D. Gajski, Samar Abdi, Ines Viskic
129
Voted
TVLSI
2008
139views more  TVLSI 2008»
15 years 3 months ago
Ternary CAM Power and Delay Model: Extensions and Uses
Applications in computer networks often require high throughput access to large data structures for lookup and classification. While advanced algorithms exist to speed these search...
Banit Agrawal, Timothy Sherwood
134
Voted
DSD
2009
IEEE
152views Hardware» more  DSD 2009»
15 years 7 months ago
ARROW - A Generic Hardware Fault Injection Tool for NoCs
Todays NoCs are reaching a level where it is getting very hard to ensure 100% of functionality. Consequently, fault tolerance has become an important aspect in todays design techn...
Michael Birner, Thomas Handl
175
Voted
KES
2010
Springer
15 years 1 months ago
Group Formation for Collaboration in Exploratory Learning Using Group Technology Techniques
Exploratory Learning Environments (ELEs) allow learners to approach a problem in different ways; they are particularly suitable for ill-defined problems where knowledge is less str...
Mihaela Cocea, George D. Magoulas