Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2000
- M. Beardo, Francesco Bruschi, Fabrizio Ferrandi, Donatella Sciuto:
An approach to functional testing of VLIW architectures. HLDVT 2000: 29-33 - Hoon Choi, Byeong-Whee Yun, Yun-Tae Lee:
Simulation strategy after model checking: experience in industrial SOC design. HLDVT 2000: 77-79 - Fulvio Corno, Gianluca Cumani, Matteo Sonza Reorda, Giovanni Squillero:
An RT-level fault model with high gate level correlation. HLDVT 2000: 3-8 - Dominique Federici, Paul Bisgambiglia, Jean François Santucci:
High level fault simulation: experiments and results on ITC'99 benchmarks. HLDVT 2000: 118-123 - Amjad Hajjar, Tom Chen, Anneliese von Mayrhauser:
On statistical behavior of branch coverage in testing behavioral VHDL models. HLDVT 2000: 89-94 - Cordula Hansen, Wolfgang Rosenstiel:
Transformation of algorithmic simulation vector sets considering mapping problems of I/O operations. HLDVT 2000: 173-178 - Harry Hsieh, Felice Balarin:
Refining abstract equivalence analysis for embedded system design. HLDVT 2000: 139-146 - Yee-Wing Hsieh, Steven P. Levitan:
Abstraction techniques for verification of multiple tightly coupled counters, registers and comparators. HLDVT 2000: 133-138 - M. S. Jahanpour, Eduard Cerny:
Compositional verification of an ATM switch module using interface recognizer/suppliers (IRS). HLDVT 2000: 71-76 - Tianjing Jiang, Robert H. Klenke, James H. Aylor, Gang Han:
System level testability analysis using Petri nets. HLDVT 2000: 112-117 - Michael D. Jones, Ganesh Gopalakrishnan:
Toward automated abstraction for protocols on branching networks. HLDVT 2000: 147-152 - Stefan Koerner:
Code simulation concept for S/390 processors using an emulation system. HLDVT 2000: 101-102 - Marcello Lajolo, Maurizio Rebaudengo, Matteo Sonza Reorda, Massimo Violante, Luciano Lavagno:
Behavioral-level test vector generation for system-on-chip designs. HLDVT 2000: 21-26 - Mihai T. Lazarescu, Jwahar R. Bammi, Edwin A. Harcourt, Luciano Lavagno, Marcello Lajolo:
Compilation-based software performance estimation for system level design. HLDVT 2000: 167-172 - Anneliese von Mayrhauser, Tom Chen, Jan Kok, Chuck Anderson, Anita Read, Amjad Hajjar:
On choosing test criteria for behavioral level hardware design verification. HLDVT 2000: 124-130 - Debashis Panigrahi, Clark N. Taylor, Sujit Dey:
Interface based hardware/software validation of a system-on-chip. HLDVT 2000: 53-58 - Christophe Paoli, Marie-Laure Nivet, Jean François Santucci:
Use of constraint solving in order to generate test vectors for behavioral validation. HLDVT 2000: 15-20 - Robert Pasko, Radim Cmar, Patrick Schaumont, Serge Vernalde:
Functional verification of an embedded network component by co-simulation with a real network. HLDVT 2000: 64-67 - Matthias Pflanz, Christian Galke, Heinrich Theodor Vierhaus:
A new method for on-line state machine observation for embedded microprocessors. HLDVT 2000: 34-39 - Rajesh Radhakrishnan, Elena Teica, Ranga Vemuri:
An approach to high-level synthesis system validation using formally verified transformations. HLDVT 2000: 80-85 - Jürgen Ruf, Dirk W. Hoffmann, Thomas Kropf, Wolfgang Rosenstiel:
Checking temporal properties under simulation of executable system descriptions. HLDVT 2000: 161-166 - Sandhya Seshadri, Michael S. Hsiao:
Formal operator testability methods for behavioral-level DFT using value ranges. HLDVT 2000: 105-111 - Hiroyuki Tomiyama, Taisei Yoshino, Nikil D. Dutt:
Verification of in-order execution in pipelined processors. HLDVT 2000: 40-44 - Karen A. Tomko, Anurag Tiwari:
Hardware/software co-debugging for reconfigurable computing. HLDVT 2000: 59-63 - Vivekananda M. Vedula, Jacob A. Abraham:
A novel methodology for hierarchical test generation using functional constraint composition. HLDVT 2000: 9-14 - Bart Vermeulen, Gert-Jan van Rootselaar:
Silicon debug of a co-processor array for video applications. HLDVT 2000: 47-52 - Fabian Wolf, Rolf Ernst:
Data flow based cache prediction using local simulation. HLDVT 2000: 155-160 - Hajime Yamashita, Hiroto Yasuura, Eko Fajar, Yun Cao:
Variable size analysis and validation of computation quality. HLDVT 2000: 95-100 - Proceedings of the IEEE International High-Level Design Validation and Test Workshop 2000, Berkeley, California, USA, November 8-10, 2000. IEEE Computer Society 2000, ISBN 0-7695-0786-7 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-22 22:59 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint