Essays about: "Hardware Verification"
Showing result 16 - 20 of 102 essays containing the words Hardware Verification.
-
16. Deployment, verification, and optimization of algorithms for simultaneous task planning and allocation in dynamic environments.
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : With the upgrading of hardware such as sensors, processors, and artificial intelligence technologies, robotics technology is developing in the direction of intelligence. As multi-robot collaborative work is required in more and more scenarios, the robustness of multi-robot systems(MRS) against sensor errors, mapping errors, and dynamic obstacles is becoming a focus issue. READ MORE
-
17. μSPL - Proprietary Graphics Language Transpiler : Asserting translation correctness using runtime verification
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Swedish Armed Forces are currently considering extending the operational life of the Saab JAS 39 Gripen C/D multirole fighter aircraft by an additional 10 to 20 years. This has resulted in a need to upgrade many of the hardware components originally developed in the late 1980s and early 1990s. READ MORE
-
18. Enhancing Analysis of Hardware Design Verification Metrics Using Machine Learning & Data Visualization
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Closing coverage holes during verification of digital integrated circuits is an iterative process to guarantee all parts are verified before fabrication. The time and manpower it takes to close coverage holes extend with the increasing complexity and size of a digital circuit. READ MORE
-
19. Safety-Oriented Task Offloading for Human-Robot Collaboration : A Learning-Based Approach
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In Human-Robot Collaboration scenarios, safety must be ensured by a risk management process that requires the execution of computationally expensive perception models (e.g., based on computer vision) in real-time. However, robots usually have constrained hardware resources that hinder timely responses, resulting in unsafe operations. READ MORE
-
20. Formal verification of device driver monitors in HOL 4
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As computer systems become more ubiquitous in society the negative consequences of security holes and bugs in software and hardware grow larger. In theory, the optimal way to ensure that no such possibilites exists is to conduct formal proofs that the system behaves as it should and that it is incapable of performing unintended side-effects. READ MORE