Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 15 Oct 2024Bibliometrics
Skip Table Of Content Section
research-article
Introducing Safety Requirements Traceability Support in Model-Driven Development of Robotic Applications

Requirements traceability is a technique intended to help determine the impact of changes in software design, support their integration, preserve knowledge, and assure the quality and correctness of the overall system. This paper presents an approach ...

research-article
Integrated Design-Stage Failure Analysis of Software-Driven Hardware Systems

Software-driven hardware configurations account for the majority of modern safety-critical complex systems. The often costly failures of such systems can be attributed to software specific, hardware specific, or software/hardware interaction failures. ...

research-article
Efficient Reachability Analysis for Time Petri Nets

We propose in this paper some efficient approaches, based on the state class graph method, to construct abstractions for the Time Petri Net (TPN) model, suitable to verify its linear or reachability properties. Experimental results have shown that these ...

research-article
Efficient, Decentralized Computation of the Topology of Spatial Regions

The capability to query the topology of spatial regions is fundamental to today's centralized spatial computing systems, like spatial databases and GIS. By contrast, this paper explores decentralized algorithms for computing the topology of spatial ...

research-article
Redundancy Mining for Soft Error Detection in Multicore Processors

The trends in technology scaling and the reduction in supply voltages have significantly improved the performance and energy consumption in modern microprocessors. Microprocessors are being built with higher degrees of spatial parallelism and deeper ...

research-article
RT-PLRU: A New Paging Scheme for Real-Time Execution of Program Codes on NAND Flash Memory for Portable Media Players

NAND flash memory has been widely used as a nonvolatile storage for storing data. However, it is challenging to execute program codes on NAND flash memory, since NAND flash memory only supports page-based reads, not byte-level random reads. This paper ...

research-article
A New Placement-Ideal Layout for Multiway Replication Storage System

Technology trends are making sophisticated replication-based storage architectures become a standard commercial practice in today's computing. Existing solutions successfully developed optimal and near-optimal parallelism layouts such as declustered ...

research-article
Embedding Meshes and Tori on Double-Loop Networks of the Same Size

Double-loop networks are extensions of ring networks and are widely used in the design and implementation of local area networks and parallel processing architectures. However, embedding of other types of networks on double-loop networks has not been ...

research-article
Performance Optimization Based on Analytical Modeling in a Real-Time System with Constrained Time/Utility Functions

We consider a single-processor firm real-time (FRT) system with exponential interarrival and execution times for jobs with relative deadlines following a general distribution. The scheduling policy of the system is first-come first-served (FCFS) and the ...

research-article
A Power and Throughput-Efficient Packet Classifier with n Bloom Filters

Packet processing is a critical operation in a high-speed router, and in order for this router to achieve memory efficient and fast {\cal O}(1) lookup operations, Bloom filters (BFs) have been widely used as a packet classifier to reduce expensive hash ...

research-article
Implementing End-to-End Register Data-Flow Continuous Self-Test

While Moore's Law predicts the ability of semiconductor industry to engineer smaller and more efficient transistors and circuits, there are serious issues not contemplated in that law. One concern is the verification effort of modern computing systems, ...

research-article
Efficient Multi-Input/Multi-Output VLSI Architecture for Two-Dimensional Lifting-Based Discrete Wavelet Transform

This brief paper proposes an efficient multi-input/multi-output VLSI architecture (MIMOA) for two-dimensional lifting-based discrete wavelet transform (DWT). The novelty is the simplicity and generality to construct the MIMOA, which is a high-speed ...

research-article
Improved n-Term Karatsuba-Like Formulas in GF(2)

It is well known that Chinese Remainder Theorem (CRT) can be used to construct efficient algorithms for multiplication of polynomials over GF(2). In this note, we show how to select an appropriate set of modulus polynomials to obtain minimal number of ...

Comments