Filters








91 Hits in 3.6 sec

A DVFS-aware cache bypassing technique for multiple clock domain mobile SoCs

Joonho Kong, Kwangho Lee
2017 IEICE Electronics Express  
Our technique profiles latencies of the various levels of the caches.  ...  Based on the profiled information, our technique adaptively bypasses intermediate levels of caches in the case of abnormal cache hierarchy and applies power-gating to that cache memory for better energy  ...  Acknowledgments This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (2015R1C1A1A01051836  ... 
doi:10.1587/elex.14.20170324 fatcat:cmfk2lkav5dlrjvypu36vdgena

Group based Shortest Path Routing Algorithm for Hierarchical Cross Connected Recursive Networks (HCCR)

Omair Inam, et.al.
2016 International Journal of Computing and Digital Systems  
A unique address encoding scheme is proposed for hierarchical graphical representation of HCCR networks, based on which the GSR was developed. .  ...  The proposed addressing scheme divides the HCCR network into logical groups of same as well as different sizes. Packets move towards receiver using local or global routing.  ...  Simulation Results Verification of shortest path: For test and verification of GSR, (with 1024 nodes) is considered.  ... 
doi:10.12785/ijcds/050205 fatcat:65mi6llgzngzfes6j2vz6dxywa

A Low Power SOC Architecture for the V2.0+EDR Bluetooth Using a Unified Verification Platform

Jeonghun KIM, Suki KIM, Kwang-Hyun BAEK
2010 IEICE transactions on information and systems  
We also address some of issues and benefits of reusable and unified environment on a centralized data structure and SOC verification platform.  ...  , sub band codec, platform-based design, verification  ...  Acknowledgments This work is supported by "System IC 2010" project of Korea Ministry of Knowledge Economy. The authors would like to thank K.T Moon, J.W. Jeong and T.S.  ... 
doi:10.1587/transinf.e93.d.2500 fatcat:sbkl3cqpkrcsxeqsqmtmmvsb3e

X-ray Structure of a Maquette Scaffold

Steve S. Huang, Brian R. Gibney, Steven E. Stayrook, P. Leslie Dutton, Mitchell Lewis
2003 Journal of Molecular Biology  
Deviation of the scaffold from the design is likely due to the distribution and size of hydrophobic residues.  ...  One type of scaffold used in maquette construction is a four-a-helical bundle. The sequence of the four-a-helix bundle maquettes follows a heptad repeat pattern typical of left-handed coiled-coils.  ...  Mass spectroscopic analyses were performed by the Protein Chemistry Laboratory of the University of Pennsylvania.  ... 
doi:10.1016/s0022-2836(02)01441-9 pmid:12589764 fatcat:byfnqonenjfapbbqdgff5titwm

Discrete Control for the Coordination of Administration Loops

Soguy Mak-Kare Gueye, Eric Rutten, Alain Tchana
2012 2012 IEEE Fifth International Conference on Utility and Cloud Computing  
The increasing complexity of computer systems has led to the automation of administration functions, in the form of autonomic managers.  ...  One important aspect requiring such management is the issue of energy consumption of computing systems, in the perspective of green computing.  ...  triggers the removal of a server, and it goes back to UpDown.  ... 
doi:10.1109/ucc.2012.57 dblp:conf/ucc/GueyeRT12 fatcat:7owesg263vgyjifh4zmhy2bioy

FPGA-based control of modular multilevel converters: Modeling and experimental evaluation

Md. Rabiul Islam, Youguang Guo, Jianguo Zhu
2015 2015 International Conference on Electrical & Electronic Engineering (ICEEE)  
The design and implementation of the switching controller, test platform, and experimental results are analyzed and discussed.  ...  In addition, the most common software such as MATLAB/Simulink and Xilinx ISE Design Suite-based alternative design technique is used in this paper, which may reduce the developmental time and cost of the  ...  Carrier Signal Generator The triangular carrier signals are generated by 9-bit updown counters. The frequency of the carrier signal should be much higher than that of reference signal.  ... 
doi:10.1109/ceee.2015.7428226 fatcat:wyzufesedbbwdk4zkww7rnrugu

Generating embedded software from hierarchical hybrid models

Rajeev Alur, Franjo Ivancic, Jesung Kim, Insup Lee, Oleg Sokolsky
2003 Proceedings of the 2003 ACM SIGPLAN conference on Language, compiler, and tool for embedded systems - LCTES '03  
We show how to exploit the semantics of CHARON to generate code from a model in a modular fashion, and identify sufficient conditions on the model that guarantee the absence of switching errors in the  ...  We show how to exploit the semantics of Charon to generate code from a model in a modular fashion, and identify sufficient conditions on the model that guarantee the absence of switching errors in the  ...  Acknowledgements We would like thank the members of the Hybrid Systems Group of the University of Pennsylvania for their various contribution to the Charon framework.  ... 
doi:10.1145/780732.780756 dblp:conf/lctrts/AlurIKLS03 fatcat:lwtcvqaxcjbr7i7vcmhoancbni

Generating embedded software from hierarchical hybrid models

Rajeev Alur, Franjo Ivancic, Jesung Kim, Insup Lee, Oleg Sokolsky
2003 Proceedings of the 2003 ACM SIGPLAN conference on Language, compiler, and tool for embedded systems - LCTES '03  
We show how to exploit the semantics of CHARON to generate code from a model in a modular fashion, and identify sufficient conditions on the model that guarantee the absence of switching errors in the  ...  We show how to exploit the semantics of Charon to generate code from a model in a modular fashion, and identify sufficient conditions on the model that guarantee the absence of switching errors in the  ...  Acknowledgements We would like thank the members of the Hybrid Systems Group of the University of Pennsylvania for their various contribution to the Charon framework.  ... 
doi:10.1145/780753.780756 fatcat:7twbj7vv7rdofivjxanbmow4ii

Generating embedded software from hierarchical hybrid models

Rajeev Alur, Franjo Ivancic, Jesung Kim, Insup Lee, Oleg Sokolsky
2003 SIGPLAN notices  
We show how to exploit the semantics of CHARON to generate code from a model in a modular fashion, and identify sufficient conditions on the model that guarantee the absence of switching errors in the  ...  We show how to exploit the semantics of Charon to generate code from a model in a modular fashion, and identify sufficient conditions on the model that guarantee the absence of switching errors in the  ...  Acknowledgements We would like thank the members of the Hybrid Systems Group of the University of Pennsylvania for their various contribution to the Charon framework.  ... 
doi:10.1145/780731.780756 fatcat:bokauzcvxfamrm5lbrye6qbqti

Component-Based Autonomic Managers for Coordination Control [chapter]

Soguy Mak Karé Gueye, Noël de Palma, Eric Rutten
2013 Lecture Notes in Computer Science  
The increasing complexity of computing systems has motivated the automation of their administration functions in the form of autonomic managers.  ...  One specificity and novelty of our approach is that discrete controller synthesis performs the automatic generation of the control logic, from the specification of an objective, and automata-based descriptions  ...  ) for the management of a replicated servers system based on the load balancing scheme.  ... 
doi:10.1007/978-3-642-38493-6_6 fatcat:q2y5wl2wijg3vn5nyvsk2qjwyq

An executable object-oriented semantics and its application to firewall verification

Kenro Yatake, Takuya Katayama
2010 Journal of Software and Systems Modeling  
As a case study, we show the verification of a practical firewall system.  ...  In this paper, we present the definition and implementation of the semantics. We also present a prototype verification tool ObjectLogic which supports simulation and theorem proving on the semantics.  ...  GetSetNew down-casting to the class d (which is equal to or an ancestor of e) are also different. 16 . UpDown* ∀o s.  ... 
doi:10.1007/s10270-010-0160-1 fatcat:fc6afy5gkbbwzaz5cp43bfudae

Looking for continuous local martingales with the crossing tree (Working Paper) [article]

Owen D. Jones, David A. Rolls
2009 arXiv   pre-print
Our technique is based on the concept of the crossing tree.  ...  Simulation experiments are used to assess the power of the tests, which is generally higher than recently proposed tests using the estimated quadratic variation (i.e., realised volatility).  ...  Runs Test Larsen Dixon−O'Brien O'Brien85 Runs Test UpDown Larsen UpDown Dixon−O'Brien UpDown O'Brien85 UpDown α = 0, n = 1250, δ = 1/(5 √ 10) % of all (% of tested; # tested) levels 0 1  ... 
arXiv:0911.5204v2 fatcat:uupp3hioavgddakxzvgj2ls2he

A Hybrid Method for Keystroke Biometric User Identification

Md L. Ali, Kutub Thakur, Muath A. Obaidat
2022 Electronics  
The partially observable hidden Markov model (POHMM) is an extension of the hidden Markov model (HMM), which has shown promising performance in user verification and handling missing or infrequent data  ...  The generative model and discriminative model are the two categories of statistical models used in keystroke biometric areas.  ...  [56] applied a hybrid HMM/ANN scheme to predict time-series data, which gave much better segmentation of the series.  ... 
doi:10.3390/electronics11172782 fatcat:ewegugyj55curcoyr2sdldxhge

Tuning and Validation of a Discrete-Event Model of the Egress Dynamics from Buildings

Paolo Lino, Barbara Pizzileo, Guido Maione, Bruno Maione
2011 IFAC Proceedings Volumes  
Simulation proved the validity of the proposed approach.  ...  The resulting model trades off between accuracy in representing the dynamical behavior of crowd during evacuation and the need of reducing the complexity of controller structure and design process.  ...  The validation of the door element is performed by using the previous room-corridor scheme, where a door is added at the end of the corridor.  ... 
doi:10.3182/20110828-6-it-1002.02991 fatcat:p4u57shndzdxpbdt3xydt7ebde

Ethernet as a Lossless Deadlock Free System Area Network [chapter]

Sven-Arne Reinemo, Tor Skeie
2005 Lecture Notes in Computer Science  
Furthermore, I would like to thank the coauthors of the papers that this thesis is founded on: Jose Duato, Jose Flich, Andres Mejía, Frank Olaf Sem-Jacobsen, Thomas Sødring, Ingebjørg Thelin Theiss, and  ...  Acknowledgement First and foremost I would like to thank my primary supervisor Tor Skeie for guidance and inspiration throughout the four years of thesis work.  ...  The main problems with simulation lies in deciding the necessary level of detail and verification of the simulation results.  ... 
doi:10.1007/11576235_90 fatcat:gcxhe22ol5gttm7wxzbm6yefxi
« Previous Showing results 1 — 15 out of 91 results