In recent times, assertion-based verification (ABV) has become an essential component of the pre-silicon design validation flow. However, the use of ABV to validate descriptions of systems during simulation lacks a pr...
详细信息
In recent times, assertion-based verification (ABV) has become an essential component of the pre-silicon design validation flow. However, the use of ABV to validate descriptions of systems during simulation lacks a proper coverage metric. We consider the task of determining the coverage of a set of assertions against a high-level stuck-at fault model. Such a coverage analysis can aid the verification engineer to add more assertions to enhance his property suite.
We propose a method to recover the global structure with local details around a point. To handle a large scale of motion i.e. 360 degree around the point, we use an optimization-based algorithm to estimate the structu...
详细信息
We propose a method to recover the global structure with local details around a point. To handle a large scale of motion i.e. 360 degree around the point, we use an optimization-based algorithm to estimate the structure from the panorama around the fixed camera point. The global structure estimated can thus be used to initialize a structure from motion algorithm to recover the local details through simple camera motion such as panning. Synthetic as well as real data are used to test the validity of the algorithm. Our method can be used in applications such as authoring of virtual environments from a real scene.
Wireless ATM (WATM) is being envisaged as the next-generation wireless solution for meeting the demands of the users. Besides supporting high data transfer rates, it also provides QoS (quality of service) guarantees t...
详细信息
Wireless ATM (WATM) is being envisaged as the next-generation wireless solution for meeting the demands of the users. Besides supporting high data transfer rates, it also provides QoS (quality of service) guarantees to the connections. Since the wireless channel is error-prone (bit error rate >10/sup -3/) and bandwidth is scarce, it becomes an important design issue to efficiently allocate bandwidth among users. The MAC (medium access control) layer arbitrates the channel access to the wireless medium and is also responsible for bandwidth allocation to different users. We present a new MAC protocol, FAFS (fair access fair scheduling), which provides a new contention scheme along with a novel scheduling algorithm that allocates data slots to the sources based on their packet queues, negotiated traffic requirements, signal intensity and the last time when the channel was granted to the connection (for best-effort service only). Our results show that the delay probability of the real-time packets is decreased using the techniques mentioned. We also provide improved service to the best-effort sources by avoiding large queues at the mobile terminal.
Design of an adaptive built-in-self-test (BIST) scheme for detecting multiple stuck-open faults in a CMOS complex cell is proposed. The test pattern generator (TPG) adaptively generates a subset of single-input-change...
详细信息
Design of an adaptive built-in-self-test (BIST) scheme for detecting multiple stuck-open faults in a CMOS complex cell is proposed. The test pattern generator (TPG) adaptively generates a subset of single-input-change (SIC) test pairs based on the past responses of the circuit under test (CUT). The design is universal, i.e., independent of the structure and functionality of the CUT. The average length of the test sequence (TS) in an n-input CUT is (n+1).2/sup n/ [(n+1).2/sup n-1/] in a fault-free [faulty] condition. The response analyzer (RA) is also simple to design. All robustly testable multiple stuck-open faults (occurring simultaneously both in n- and p-parts) can be detected using the proposed BIST scheme.
We present a method to automatically locate captions in MPEG video. Caption text regions are segmented from the background using their distinguishing texture characteristics. This method first locates candidate text r...
详细信息
We present a method to automatically locate captions in MPEG video. Caption text regions are segmented from the background using their distinguishing texture characteristics. This method first locates candidate text regions directly in the DCT compressed domain, and then reconstructs the candidate regions for further refinement in the spatial domain. Therefore, only a small amount of decoding is required. The proposed algorithm achieves about 4.0% false reject rate and less than 5.7% false positive rate on a variety of MPEG compressed video containing more than 42,000 frames.
Typical video search is based on queries involving a single shot. We generalize this problem by allowing queries that involve a video clip. We propose two schemes for query by video clip. In the first scheme, retrieva...
详细信息
Typical video search is based on queries involving a single shot. We generalize this problem by allowing queries that involve a video clip. We propose two schemes for query by video clip. In the first scheme, retrieval based on key frames where the database and query video are segmented into shots which are represented via key frames. For every query key frame, a similarity value (using color, texture, and motion) is associated with the key frames in the database video clip. Boundaries marking highly similar consecutive shots are then used to generate the set of retrieved video sub-clips. In the second scheme, in retrieval using sub-sampled frames, we uniformly sub-sample the query clip as well as the database video. The retrieval is based on matching color and texture features of the sub-sampled frames. Initial experiments on two video databases show promising results.
Proposes a futuristic approach to managing information. The 1960s and 1970s have seen a growth in structuring information flows. The 1980s saw the advent of management information systems (MIS). In the 1990s, computer...
详细信息
Proposes a futuristic approach to managing information. The 1960s and 1970s have seen a growth in structuring information flows. The 1980s saw the advent of management information systems (MIS). In the 1990s, computer integrated manufacturing (CIM) is picking up, and towards 2000, we are heading for enterprise integration systems (EIS). The ingredients of EIS, i.e. the information integration platforms and the technologies of televirtuality, object-oriented databases, hypertext and high-speed data networking, are discussed, and it is explained how these can be used in a synchronized and integrated manner to achieve EIS.< >
暂无评论