Sciweavers

197 search results - page 25 / 40
» Abstraction Techniques for Validation Coverage Analysis and ...
Sort
View
UML
2004
Springer
15 years 5 months ago
System-on-Chip Verification Process Using UML
Abstract. In this paper, we propose a verification methodology for System-OnChip (SoC) design using Unified Modeling Language (UML). We introduce UML as a formal model to analyze a...
Qiang Zhu, Tsuneo Nakata, Masataka Mine, Kenichiro...
CAV
2011
Springer
253views Hardware» more  CAV 2011»
14 years 4 months ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
IEEEPACT
2006
IEEE
15 years 6 months ago
An empirical evaluation of chains of recurrences for array dependence testing
Code restructuring compilers rely heavily on program analysis techniques to automatically detect data dependences between program statements. Dependences between statement instanc...
Johnnie Birch, Robert A. van Engelen, Kyle A. Gall...
100
Voted
VTC
2010
IEEE
180views Communications» more  VTC 2010»
14 years 10 months ago
Analysis of Enhanced Deployment Models for Sensor Networks
Abstract—We present the estimation and evaluation of deployment models for sensor networks that exploit different amounts of a priori information. Topologies generated from the m...
Frank Oldewurtel, Petri Mähönen
109
Voted
SAC
2004
ACM
15 years 5 months ago
WebUml: reverse engineering of web applications
Web applications have become complex and crucial for many firms, especially when combined with areas such as CRM (Customer Relationship Management) and BPR (Business Process Reen...
Carlo Bellettini, Alessandro Marchetto, Andrea Tre...