Sciweavers

3820 search results - page 157 / 764
» Bounded Model Debugging
Sort
View
TIT
2010
150views Education» more  TIT 2010»
14 years 9 months ago
Information-theoretic key agreement of multiple terminals: part I
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
Amin Aminzadeh Gohari, Venkat Anantharam
ECCC
2008
122views more  ECCC 2008»
15 years 2 months ago
Every Minor-Closed Property of Sparse Graphs is Testable
Testing a property P of graphs in the bounded degree model is the following computational problem: given a graph G of bounded degree d we should distinguish (with probability 0.9,...
Itai Benjamini, Oded Schramm, Asaf Shapira
DATE
1998
IEEE
89views Hardware» more  DATE 1998»
15 years 7 months ago
Characterization-Free Behavioral Power Modeling
We propose a new approach to RT-level power modeling for combinationalmacros, that does not require simulationbased characterization. A pattern-dependent power model for a macro i...
Alessandro Bogliolo, Luca Benini, Giovanni De Mich...
SIGSOFT
2007
ACM
16 years 3 months ago
A study of interleaving coverage criteria
Concurrency bugs are becoming increasingly important due to the prevalence of concurrent programs. A fundamental problem of concurrent program bug detection and testing is that th...
Shan Lu, Weihang Jiang, Yuanyuan Zhou
KBSE
2009
IEEE
15 years 9 months ago
Generating Fixes from Object Behavior Anomalies
Advances in recent years have made it possible in some cases to locate a bug (the source of a failure) automatically. But debugging is also about correcting bugs. Can tools do thi...
Valentin Dallmeier, Andreas Zeller, Bertrand Meyer