Sciweavers

1518 search results - page 102 / 304
» Cryptographic Test Correction
Sort
View
107
Voted
KBSE
2009
IEEE
15 years 10 months ago
Generating Fixes from Object Behavior Anomalies
Advances in recent years have made it possible in some cases to locate a bug (the source of a failure) automatically. But debugging is also about correcting bugs. Can tools do thi...
Valentin Dallmeier, Andreas Zeller, Bertrand Meyer
DSN
2000
IEEE
15 years 8 months ago
Software-Implemented Fault Detection for High-Performance Space Applications
We describe and test a software approach to overcoming radiation-induced errors in spaceborne applications running on commercial off-the-shelf components. The approach uses checks...
Michael J. Turmon, Robert Granat, Daniel S. Katz
137
Voted
DAC
1999
ACM
15 years 8 months ago
On-Chip Inductance Issues in Multiconductor Systems
As the family of Alpha microprocessors continues to scale into more advanced technologies with very high frequency edge rates and multiple layers of interconnect, the issue of cha...
Shannon V. Morton
141
Voted
VLSID
2000
IEEE
135views VLSI» more  VLSID 2000»
15 years 7 months ago
Performance and Functional Verification of Microprocessors
We address the problem of verifying the correctness of pre-silicon models of a microprocessor. We touch on the latest advances in this area by considering two different aspects of...
Pradip Bose, Jacob A. Abraham
144
Voted
DAC
1994
ACM
15 years 7 months ago
New Techniques for Efficient Verification with Implicitly Conjoined BDDs
-- In previous work, Hu and Dill identified a common cause of BDD-size blowup in high-level design verification and proposed the method of implicitly conjoined invariants to addres...
Alan J. Hu, Gary York, David L. Dill