Sciweavers

363 search results - page 48 / 73
» Validation coverage analysis for complex digital designs
Sort
View
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
14 years 9 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
MOBIHOC
2008
ACM
14 years 8 months ago
The networking shape of vehicular mobility
Mobility is the distinguishing feature of vehicular networks, affecting the evolution of network connectivity over space and time in a unique way. Connectivity dynamics, in turn, ...
Marco Fiore, Jérôme Härri
DAC
2005
ACM
14 years 9 months ago
StressTest: an automatic approach to test generation via activity monitors
The challenge of verifying a modern microprocessor design is an overwhelming one: Increasingly complex micro-architectures combined with heavy time-to-market pressure have forced ...
Ilya Wagner, Valeria Bertacco, Todd M. Austin
SIMUTOOLS
2008
13 years 10 months ago
Simulating process chain models with OMNeT++
This paper presents an approach to simulate complex hierarchical process chains resulting from large logistics networks in OMNeT++, a discrete event simulation environment designe...
Falko Bause, Peter Buchholz, Jan Kriege, Sebastian...
CASES
2003
ACM
14 years 1 months ago
Clustered calculation of worst-case execution times
Knowing the Worst-Case Execution Time (WCET) of a program is necessary when designing and verifying real-time systems. A correct WCET analysis method must take into account the po...
Andreas Ermedahl, Friedhelm Stappert, Jakob Engblo...