AAAAAA

   
Results: 1-25 | 26-50 | 51-75 | 76-100 | >>
Results: 76-100/453

Authors: Wang, CC Lee, PM Huang, CJ
Citation: Cc. Wang et al., Three alternative architectures of digital ratioed compressor design with application to inner-product processing, IEE P-COM D, 147(2), 2000, pp. 65-74

Authors: Chen, CW Lu, NP Chen, TF Chung, CP
Citation: Cw. Chen et al., Fault-tolerant gamma interconnection networks by chaining, IEE P-COM D, 147(2), 2000, pp. 75-81

Authors: Hsiung, PA
Citation: Pa. Hsiung, Hardware-software timing coverification of concurrent embedded real-time systems, IEE P-COM D, 147(2), 2000, pp. 83-92

Authors: De Gloria, A Olivieri, M
Citation: A. De Gloria et M. Olivieri, Completion-detecting carry select addition, IEE P-COM D, 147(2), 2000, pp. 93-100

Authors: Shiu, RM Chiu, JC Cheng, SK Shann, JJJ
Citation: Rm. Shiu et al., Decoding of CISC instructions in superscalar processors with high issue rate, IEE P-COM D, 147(2), 2000, pp. 101-107

Authors: Wang, CC Huang, CJ Lin, GC
Citation: Cc. Wang et al., Cell-based implementation of radix-4/2 64b dividend 32b divisor signed integer divider using the COMPASS cell library, IEE P-COM D, 147(2), 2000, pp. 109-115

Authors: Moon, SM Park, S
Citation: Sm. Moon et S. Park, Performance analysis of VLIW compilation techniques, IEE P-COM D, 147(2), 2000, pp. 117-123

Authors: Yoon, J Kim, H
Citation: J. Yoon et H. Kim, Time-redundant recovery policy of TMR failures using rollback and roll-forward methods, IEE P-COM D, 147(2), 2000, pp. 124-132

Authors: Wu, KP Joung, YJ
Citation: Kp. Wu et Yj. Joung, Asynchronous group mutual exclusion in ring networks, IEE P-COM D, 147(1), 2000, pp. 1-8

Authors: Sui, PH Wang, SD
Citation: Ph. Sui et Sd. Wang, Fault-tolerant wormhole routing algorithm for mesh networks, IEE P-COM D, 147(1), 2000, pp. 9-14

Authors: Ahmad, I Dhodhi, MK
Citation: I. Ahmad et Mk. Dhodhi, State assignment of finite-state machines, IEE P-COM D, 147(1), 2000, pp. 15-22

Authors: Harrison, PG
Citation: Pg. Harrison, Teaching M/G/1 theory with extension to priority queues, IEE P-COM D, 147(1), 2000, pp. 23-26

Authors: Edwards, PJ Murray, AF
Citation: Pj. Edwards et Af. Murray, Optimally distributed computation in augmented networks, IEE P-COM D, 147(1), 2000, pp. 27-31

Authors: Williams, AC Brown, AD Zwolinski, M
Citation: Ac. Williams et al., In-line test of synthesised systems exploiting latency analysis, IEE P-COM D, 147(1), 2000, pp. 33-41

Authors: Chan, SC Lee, KJ Wu, ZZ Jone, WB
Citation: Sc. Chan et al., Reducing test application time by scan flip-flops sharing, IEE P-COM D, 147(1), 2000, pp. 42-48

Authors: Hsiao, SF Jiang, MR
Citation: Sf. Hsiao et Mr. Jiang, Efficient synthesiser for generation of fast parallel multipliers, IEE P-COM D, 147(1), 2000, pp. 49-52

Authors: Wang, L Yang, TC
Citation: L. Wang et Tc. Yang, Compiler/hardware co-design for instruction boosting in ILP processors, IEE P-COM D, 146(6), 1999, pp. 269-274

Authors: Chen, SS Chen, JJ Tsai, CC Chen, SJ
Citation: Ss. Chen et al., Automatic router for the pin grid array package, IEE P-COM D, 146(6), 1999, pp. 275-281

Authors: Solana, JM Manzano, MA
Citation: Jm. Solana et Ma. Manzano, PASE-scan design: A new full-scan structure to reduce test application time, IEE P-COM D, 146(6), 1999, pp. 283-293

Authors: Wan, Y Khalil, MA Wey, CL
Citation: Y. Wan et al., Efficient conversion algorithms for long-word-length binary logarithmic numbers and logic implementation, IEE P-COM D, 146(6), 1999, pp. 295-301

Authors: Lee, G Drechsler, R Perkowski, MA
Citation: G. Lee et al., ETDD-based synthesis of two-dimensional cellular arrays for multi-output incompletely specified Boolean functions, IEE P-COM D, 146(6), 1999, pp. 302-308

Authors: Chang, TS Jen, CW
Citation: Ts. Chang et Cw. Jen, Hardware-efficient implementations for discrete function transforms using LUT-based FPGAs, IEE P-COM D, 146(6), 1999, pp. 309-315

Authors: Baldi, M Macii, A Macii, E Poncino, R
Citation: M. Baldi et al., Application of symbolic FSM Markovian analysis to protocol verification, IEE P-COM D, 146(5), 1999, pp. 221-226

Authors: Fleury, M Downton, AC Clark, AF
Citation: M. Fleury et al., Scheduling schemes for data farming, IEE P-COM D, 146(5), 1999, pp. 227-234

Authors: Kuo, FH Shen, VRL Chen, TS Lai, F
Citation: Fh. Kuo et al., Cryptographic key assignment scheme for dynamic access control in a user hierarchy, IEE P-COM D, 146(5), 1999, pp. 235-240
Risultati: 1-25 | 26-50 | 51-75 | 76-100 | >>