Sciweavers

1684 search results - page 133 / 337
» The lexicographic decision function
Sort
View
DATE
2010
IEEE
173views Hardware» more  DATE 2010»
15 years 9 months ago
Robust design of embedded systems
—This paper presents a methodology to evaluate and optimize the robustness of an embedded system in terms of invariability in case of design revisions. Early decisions in embedde...
Martin Lukasiewycz, Michael Glaß, Jürge...
DAC
1996
ACM
15 years 8 months ago
Bit-Level Analysis of an SRT Divider Circuit
Abstract-- It is impractical to verify multiplier or divider circuits entirely at the bit-level using ordered Binary Decision Diagrams (BDDs), because the BDD representations for t...
Randal E. Bryant
CCS
1994
ACM
15 years 8 months ago
Application Access Control at Network Level
This paper describes an access control mechanism that enforces at the network level an access control decision that is taken at the application level. The mechanism is based on th...
Refik Molva, Erich Rütsche
115
Voted
DAC
1994
ACM
15 years 8 months ago
HSIS: A BDD-Based Environment for Formal Verification
Functional and timing verification are currently the bottlenecks in many design efforts. Simulation and emulation are extensively used for verification. Formal verification is now...
Adnan Aziz, Felice Balarin, Szu-Tsung Cheng, Ramin...
VW
2000
Springer
15 years 7 months ago
A Framework to Dynamically Manage Distributed Virtual Environments
Abstract. In this paper, we present the project Urbi et Orbi, a framework to dynamically manage distributed virtual environments (DVEs). This framework relies on a dedicated script...
Yoann Fabre, Guillaume Pitel, Laurent Soubrevilla,...