Sciweavers

1518 search results - page 185 / 304
» Cryptographic Test Correction
Sort
View
101
Voted
RE
2001
Springer
15 years 5 months ago
Events and Constraints: A Graphical Editor for Capturing Logic Requirements of Programs
A logic model checker can be an effective tool for debugging software applications. A stumbling block can be that model checking tools expect the user to supply a formal statement...
Margaret H. Smith, Gerard J. Holzmann, Kousha Etes...
91
Voted
ISSTA
2000
ACM
15 years 5 months ago
Requirements-based monitors for real-time systems
—Before designing safety- or mission-critical real-time systems, a specification of the required behavior of the system should be produced and reviewed by domain experts. After ...
Dennis K. Peters, David Lorge Parnas
99
Voted
ICCD
1996
IEEE
134views Hardware» more  ICCD 1996»
15 years 5 months ago
Pausible Clocking: A First Step Toward Heterogeneous Systems
This paper describes a novel communication scheme, which is guaranteed to be free of synchronization failures, amongst multiple synchronous modules operating independently. In thi...
Kenneth Y. Yun, Ryan P. Donohue
ACSC
2007
IEEE
15 years 4 months ago
Segmentation and Border Identification of Cells in Images of Peripheral Blood Smear Slides
We present an unsupervised blood cell segmentation algorithm for images taken from peripheral blood smear slides. Unlike prior algorithms the method is fast; fully automated; find...
Nicola Ritter, James R. Cooper
85
Voted
VLDB
1995
ACM
87views Database» more  VLDB 1995»
15 years 4 months ago
Redo Recovery after System Crashes
: This paper defines a framework for explaining redo recovery after a system crash. In this framework, an installation graph explains the order in which operations must be install...
David B. Lomet, Mark R. Tuttle