False path analysis is an activity with applications in a variety of computer science and engineering domains like for instance high-level synthesis, worst case execution time est...
This paper demonstrates a formal verificationplanning process and presents associated verification strategy that we believe is an essential (yet often neglected) step in an ASIC o...
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
An analytical and experimental investigation of a jet pipe controlled electropneumatic servoactuator designed for use in the Utah/MIT dextrous hand (UMDH) has been performed. An ac...
We present TFWC, a TCP-friendly window-based congestion control mechanism for real-time multimedia streaming applications. Although TFRC is regarded as a de facto standard for tho...