Sciweavers

114 search results - page 8 / 23
» Verification by Simulation Comparison using Interface Synthe...
Sort
View
ICCAD
2000
IEEE
124views Hardware» more  ICCAD 2000»
14 years 10 days ago
A Methodology for Verifying Memory Access Protocols in Behavioral Synthesis
— Memory is one of the most important components to be optimized in the several phases of the synthesis process. ioral synthesis, a memory is viewed as an abstract construct whic...
Gernot Koch, Taewhan Kim, Reiner Genevriere
GECCO
2007
Springer
144views Optimization» more  GECCO 2007»
13 years 11 months ago
The reliability of confidence intervals for computational effort comparisons
This paper analyses the reliability of confidence intervals for Koza's computational effort statistic. First, we conclude that dependence between the observed minimum generat...
Matthew Walker, Howard Edwards, Chris H. Messom
ICSE
2003
IEEE-ACM
14 years 8 months ago
Modular Verification of Software Components in C
We present a new methodology for automatic verification of C programs against finite state machine specifications. Our approach is compositional, naturally enabling us to decompos...
Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh ...
CAMAD
2006
IEEE
13 years 10 months ago
Nessi: a python network simulator for fast protocol development
A new and simple network simulator Nessi is described in this paper. While other simulators focus on minimizing the simulation time, Nessi tries to minimize the development time an...
Jérôme Vernez, Jürgen Ehrensberg...
ICIP
2008
IEEE
14 years 2 months ago
Palmprint image synthesis: A preliminary study
In this paper we present a preliminary study of palmprint image synthesis and propose a framework for synthesizing palmprint texture. We first extract principal lines of real pal...
Zhuoshi Wei, Yufei Han, Zhenan Sun, Tieniu Tan