Sciweavers

2763 search results - page 18 / 553
» The Dangerous 'All' in Specifications
Sort
View
FORTE
1998
13 years 9 months ago
Hardware synthesis from protocol specifications in LOTOS
: In this paper, we propose a technique for hardware implementation of protocol specifications in LOTOS. For the purpose, we define a new model called synchronous EFSMs consisting ...
Keiichi Yasumoto, Akira Kitajima, Teruo Higashino,...
COMCOM
1998
117views more  COMCOM 1998»
13 years 7 months ago
Specification, validation, and verification of time-critical systems
In this paper, we propose a new formalism, named the Timed Communicating Finite State Machine (Timed CFSM), for specifying and verifying time-critical systems. Timed CFSM preserve...
Shiuh-Pyng Shieh, Jun-Nan Chen
SIGPRO
2008
105views more  SIGPRO 2008»
13 years 7 months ago
Peak constrained two-dimensional quadrantally symmetric eigenfilter design without transition band specification
Abstract-- The design of a two dimensional (2D) quadrantally symmetric FIR filter with peak constrained magnitude response is considered. We further considered the design specifica...
Chi-Wah Kok, Wan-Chi Siu, Ying-Man Law
ICMCS
2000
IEEE
102views Multimedia» more  ICMCS 2000»
14 years 7 days ago
Trader's Quality of Service Specifications and Effects on System Performance for Video-on-Demand
In this paper we present a detailed review on the Trader’s Quality of Service (QoS) Specifications and the Effects on System Performance for Video-on-Demand Multimedia (MM) Appl...
Edward Babulak
ECOWS
2004
Springer
13 years 11 months ago
Coupled Signature and Specification Matching for Automatic Service Binding
Abstract. Matching of semantic service descriptions is the key to automatic service discovery and binding. Existing approaches split the matchmaking process in two step: signature ...
Michael Klein, Birgitta König-Ries