Sciweavers

3820 search results - page 233 / 764
» Bounded Model Debugging
Sort
View
121
Voted
FSTTCS
2005
Springer
15 years 9 months ago
When Are Timed Automata Weakly Timed Bisimilar to Time Petri Nets?
In this paper4 , we compare Timed Automata (TA) and Time Petri Nets (TPN) with respect to weak timed bisimilarity. It is already known that the class of bounded TPNs is strictly in...
Béatrice Bérard, Franck Cassez, Serg...
102
Voted
CONCUR
2004
Springer
15 years 9 months ago
Resource Control for Synchronous Cooperative Threads
We develop new methods to statically bound the resources needed for the execution of systems of concurrent, interactive threads. Our study is concerned with a synchronous model of ...
Roberto M. Amadio, Silvano Dal-Zilio
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
15 years 8 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi
ICCAD
1997
IEEE
101views Hardware» more  ICCAD 1997»
15 years 7 months ago
Minimum area retiming with equivalent initial states
Traditional minimum area retiming algorithms attempt to achieve their prescribed objective with no regard to maintaining the initial state of the system. This issue is important f...
Naresh Maheshwari, Sachin S. Sapatnekar
114
Voted
INFOCOM
1994
IEEE
15 years 7 months ago
Any Work-Conserving Policy Stabilizes the Ring with Spatial Reuse
We consider the ring network with spatial reuse. Tra c streams may enter and exit the network at any node. We adopt an arrival tra c model with deterministic constraints on its sa...
Leandros Tassiulas, Leonidas Georgiadis