![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34 matches
- 2014
- Omar Abdelmalek, David Hély
, Vincent Beroulle:
Fault tolerance evaluation of RFID tags. LATW 2014: 1-6 - Jörg Behrend, Alexander Grünhage, Douglas Schroeder, Djones Lettnin, Jürgen Ruf, Thomas Kropf, Wolfgang Rosenstiel:
Optimized hybrid verification of embedded software. LATW 2014: 1-6 - Salma Bergaoui, Pierre Vanhauwaert, Régis Leveugle:
IDSM: An improved disjoint signature monitoring scheme for processor behavioral checking. LATW 2014: 1-6 - Nicola Bombieri
, Franco Fummi, Valerio Guarnieri, Graziano Pravadelli
, Francesco Stefanni, Tara Ghasempouri
, Michele Lora
, Giovanni Auditore, Mirella Negro Marcigaglia:
On the reuse of RTL assertions in SystemC TLM verification. LATW 2014: 1-6 - Pablo Briff
, Ariel Lutenberg, Leonardo Rey Vega
, Fabian Vargas, Mohammad N. Patwary:
A novel control strategy for fail-safe cyclic data exchange in wireless sensor networks. LATW 2014: 1-5 - Cristiano P. Chenet, Alisson J. C. Lanot, Tiago R. Balen:
Design diversity redundancy with spatial-temporal voting applied to data acquisition systems. LATW 2014: 1-6 - Karine Coulié-Castellani, Wenceslas Rahajandraibe, Gilles Micolau, Hassen Aziza, Jean-Michel Portal:
Improvement of a VCO concept for low energy particule detection and recognition. LATW 2014: 1-4 - Sonia Ben Dhia, Alexandre Boyer:
Design of on-chip sensors to monitor electromagnetic activity in ICs: Towards on-line diagnosis and self-healing. LATW 2014: 1-6 - Arwa Ben Dhia, Mariem Slimani, Lirida A. B. Naviner
:
Improving the robustness of a switch box in a mesh of clusters FPGA. LATW 2014: 1-6 - Jose Luis Garcia-Gervacio, Jaime Martínez-Castillo
, Víctor H. Champac:
Possibilities of defect-size magnification for testing resistive-opens in nanometer technologies. LATW 2014: 1-6 - Filipe de Aguiar Geissler, Fernanda Lima Kastensmidt
, Jose Eduardo Pereira Souza:
Soft error injection methodology based on QEMU software platform. LATW 2014: 1-5 - Iuri A. C. Gomes, Mayler G. A. Martins, Fernanda Lima Kastensmidt
, André Inácio Reis, Renato P. Ribas, Sylvain P. Novales:
Methodology for achieving best trade-off of area and fault masking coverage in ATMR. LATW 2014: 1-6 - Ricardo A. Guazzelli, Guilherme Heck, Matheus T. Moreira, Ney Laert Vilar Calazans
:
Schmitt trigger on output inverters of NCL gates for soft error hardening: Is it enough? LATW 2014: 1-5 - Sergei Kostin, Jaan Raik
, Raimund Ubar
, Maksim Jenihhin
, Fabian Vargas, Letícia Maria Bolzani Poehls, Thiago Santos Copetti:
Hierarchical identification of NBTI-critical gates in nanoscale logic. LATW 2014: 1-6 - S. Ben Krit, Wenceslas Rahajandraibe, Karine Castellani-Coulié, Gilles Micolau, Alexandre Levisse, A. Lyoussi:
Development of a digital tool for the simulation of a readout system dedicated for neutrons discrimination. LATW 2014: 1-6 - Alisson J. C. Lanot, Tiago R. Balen:
Analysis of the effects of single event transients on an SAR-ADC based on charge redistribution. LATW 2014: 1-5 - Syhem Larguech, Florence Azaïs, Serge Bernard
, Vincent Kerzerho, Mariane Comte, Michel Renovell:
Evaluation of indirect measurement selection strategies in the context of analog/RF alternate testing. LATW 2014: 1-6 - Hsun-Cheng Lee, Jacob A. Abraham:
Harmonic distortion correction for 8-bit delay line ADC using gray code. LATW 2014: 1-4 - Wassim Mansour, Pablo Ramos, Rafic A. Ayoubi, Raoul Velazco:
SEU fault-injection at system level: Method, tools and preliminary results. LATW 2014: 1-5 - Carlos Ivan Castro Marquez, Marius Strum, Jiang Chau Wang
:
A unified sequential equivalence checking approach to verify high-level functionality and protocol specification implementations in RTL designs. LATW 2014: 1-6 - Victor M. Goncalves Martins, Frederico Ferlini, Djones Vinicius Lettnin, Eduardo Augusto Bezerra
:
Low cost fault detector guided by permanent faults at the end of FPGAs life cycle. LATW 2014: 1-6 - Werner Nedel, Fernanda Lima Kastensmidt
, José Rodrigo Azambuja:
Implementation and experimental evaluation of a CUDA core under single event effects. LATW 2014: 1-4 - Evaldo Carlos Fonseca Pereira, Odair Lelis Goncalez, Rafael Galhardo Vaz, Claudio Antonio Federico
, Thiago Hanna Both, Gilson Inácio Wirth
:
The effects of total ionizing dose on the neutron SEU cross section of a 130 nm 4 Mb SRAM memory. LATW 2014: 1-4 - Petr Pfeifer, Zdenek Plíva
, Pieter Weckx, Ben Kaczer:
On reliability enhancement using adaptive core voltage scaling and variations on nanoscale FPGAs. LATW 2014: 1-4 - Luca Piccolboni
, Graziano Pravadelli
:
Simplified stimuli generation for scenario and assertion based verification. LATW 2014: 1-6 - Felipe Restrepo-Calle
, Sergio Cuenca-Asensi
, Antonio Martínez-Álvarez
, Eduardo Chielle
, Fernanda Lima Kastensmidt
:
Efficient metric for register file criticality in processor-based systems. LATW 2014: 1-6 - Alan Carlos Junior Rossetto, Gilson Inácio Wirth
, Ricardo Vanni Dallasen:
Performance analysis of a clock generator PLL under TID effects. LATW 2014: 1-5 - Suraj Sindia, Vishwani D. Agrawal:
Specification test minimization for given defect level. LATW 2014: 1-6 - Lucas A. Tambara, Jorge L. Tonfat
, Ricardo Reis
, Fernanda Lima Kastensmidt
, Evaldo Carlos Fonseca Pereira, Rafael Galhardo Vaz, Odair Lelis Goncalez:
Soft error rate in SRAM-based FPGAs under neutron-induced and TID effects. LATW 2014: 1-6 - Raimund Ubar
, Anton Tsertov
, Artjom Jasnetski, Marina Brik:
Software-based self-test generation for microprocessors with high-level decision diagrams. LATW 2014: 1-6
skipping 4 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-04 06:38 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint