Pereira, Pedro, M. Fino, Fernando Coito, and Mário Ventim-Neves. "
GADISI – Genetic Algorithms Applied to the Automatic Design of Integrated Spiral Inductors."
Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2010. Eds. Luis Camarinha-Matos, Pedro Pereira, and Luis Ribeiro. Vol. 314. IFIP Advances in Information and Communication Technology, 314. Costa de Caparica - Portugal: Springer Boston, 2010. 515-522.
AbstractThis work introduces a tool for the optimization of CMOS integrated spiral inductors. The main objective of this tool is to offer designers a first approach for the determination of the inductor layout parameters. The core of the tool is a Genetic Algorithm (GA) optimization procedure where technology constraints on the inductor layout parameters are considered. Further constraints regarding inductor design heuristics are also accounted for. Since the layout parameters are inherently discrete due to technology and topology constraints, discrete variable optimization techniques are used. The Matlab GA toolbox is used and the modifications on the GA functions, yielding technology feasible solutions is presented. For the sake of efficiency and simplicity the pi-model is used for characterizing the inductor. The validity of the design results obtained with the tool, is checked against circuit simulation with ASITIC.
Lourenço, João M., Eitan Farchi, and Shmuel Ur Proceedings of the 8th Workshop on Parallel and Distributed Systems: Testing, Analysis, and Debugging (PADTAD'10). Eds. João M. Lourenço, Eitan Farhi, and Shmuel Ur. New York, NY, USA: ACM, 2010.
Abstract
F. Heidenreich, P. Sanchez, J. Santos, S. Zschaler, M. Alferez, J. Araújo, L. Fuentes, U. Kulesza, A. Moreira, and A. Rashid. "
Relating Feature Models to Other Models of a Software Product Line - A Comparative Study of FeatureMapper and VML*."
Transactions on Aspect-Oriented Software Development VII, Special Issue on A Common Case Study for Aspect-Oriented Modeling. LNCS 6210 (2010): 69-114.
Abstract
Liu, Yan, Robert A. Childs, Tatyana Matrosovich, Stephen Wharton, Angelina S. Palma, Wengang Chai, Rodney Daniels, Victoria Gregory, Jennifer Uhlendorff, Makoto Kiso, Hans-Dieter Klenk, Alan Hay, Ten Feizi, and Mikhail Matrosovich. "
Altered Receptor Specificity and Cell Tropism of D222G Hemagglutinin Mutants Isolated from Fatal Cases of Pandemic A(H1N1) 2009 Influenza Virus."
Journal of Virology. 84 (2010): 12069-12074.
Abstractn/a
Surzhykov, A., A. Volotka, F. Fratini, J. P. Santos, P. Indelicato, G. Plunien, Th Stöhlker, and S. Fritzsche. "
Angular correlations in the two-photon decay of heliumlike heavy ions."
Physical Review A. 81 (2010): 042510.
AbstractThe two-photon decay of heavy, helium-like ions is investigated based on second-order perturbation theory and Dirac’s relativistic equation. Special attention has been paid to the angular emission of the two photons (i.e., how the angular correlation function depends on the shell structure of the ions in their initial and final states). Moreover, the effects from the (electric and magnetic) nondipole terms in the expansion of the electron-photon interaction are discussed. Detailed calculations have been carried out for the two-photon decay of the 1s2s1S0, 1s2s3S1, and 1s2p3P0 states of helium-like Xe52+, Au77+, and U90+ ions.
Teixeira, Bruno, João Louren{\c c}o, Eitan Farchi, Ricardo Dias, and Diogo Sousa. "
Detection of Transactional Memory anomalies using static analysis."
Proceedings of the 8th Workshop on Parallel and Distributed Systems: Testing, Analysis, and Debugging. PADTAD ’10. New York, NY, USA: ACM, 2010. 26-36.
AbstractTransactional Memory allows programmers to reduce the number of synchronization errors introduced in concurrent programs, but does not ensures its complete elimination. This paper proposes a pattern matching based approach to the static detection of atomicity violation, based on a path-sensitive symbolic execution method to model four anomalies that may affect Transactional Memory programs. The proposed technique may be used to to bring to programmer’s attention pairs of transactions that the programmer has mis-specified, and should have been combined into a single transaction. The algorithm first traverses the AST tree, removing all the non-transactional blocks and generating a trace tree in the path sensitive manner for each thread. The trace tree is a Trie like data structure, where each path from root to a leaf is a list of transactions. For each pair of threads, erroneous patterns involving two consecutive transactions are then checked in the trace tree. Results allow to conclude that the proposed technique, although triggering a moderate number of false positives, can be successfully applied to Java programs, correctly identifying the vast majority of the relevant erroneous patterns.