Sciweavers

130 search results - page 3 / 26
» Efficiently Verifiable Escape Analysis
Sort
View
ISQED
2011
IEEE
230views Hardware» more  ISQED 2011»
12 years 9 months ago
Constraint generation for software-based post-silicon bug masking with scalable resynthesis technique for constraint optimizatio
Due to the dramatic increase in design complexity, verifying the functional correctness of a circuit is becoming more difficult. Therefore, bugs may escape all verification effo...
Chia-Wei Chang, Hong-Zu Chou, Kai-Hui Chang, Jie-H...
SP
2008
IEEE
187views Security Privacy» more  SP 2008»
13 years 5 months ago
Efficient and Robust TCP Stream Normalization
Network intrusion detection and prevention systems are vulnerable to evasion by attackers who craft ambiguous traffic to breach the defense of such systems. A normalizer is an inl...
Mythili Vutukuru, Hari Balakrishnan, Vern Paxson
PASTE
1998
ACM
13 years 9 months ago
Efficient Composite Data Flow Analysis Applied to Concurrent Programs
FLAVERS, a tool for verifying properties of concurrent systems, uses composite data flow analysis to incrementally improve the precision of the results of its verifications. Altho...
Gleb Naumovich, Lori A. Clarke, Leon J. Osterweil
DATE
2004
IEEE
134views Hardware» more  DATE 2004»
13 years 9 months ago
Cost-Efficient Block Verification for a UMTS Up-Link Chip-Rate Coprocessor
ASIC designs for future communication applications cannot be simulated exhaustively. Formal Property Checking is a powerful technology to overcome the limitations of current funct...
Klaus Winkelmann, Hans-Joachim Trylus, Dominik Sto...
EJWCN
2010
94views more  EJWCN 2010»
13 years 19 days ago
Efficient Scheduling of Pigeons for a Constrained Delay Tolerant Application
Information collection in the disaster area is an important application of pigeon networks - a special type of delay tolerant networks (DTN) that borrows the ancient idea of using ...
Jiazhen Zhou, Jiang Li, Legand L. Burge III