Sciweavers

598 search results - page 37 / 120
» Efficient and User-Friendly Verification
Sort
View
ACSD
1998
IEEE
90views Hardware» more  ACSD 1998»
15 years 1 months ago
Verification of Pipelined Microprocessors by Correspondence Checking in Symbolic Ternary Simulation
This paper makes the idea of memory shadowing [5] applicable to symbolic ternary simulation. Memory shadowing, an extension of Burch and Dill's pipeline verification method [...
Miroslav N. Velev, Randal E. Bryant
TACAS
1998
Springer
105views Algorithms» more  TACAS 1998»
15 years 1 months ago
Verification of Large State/Event Systems Using Compositionality and Dependency Analysis
A state/event model is a concurrent version of Mealy machines used for describing embedded reactive systems. This paper introduces a technique that uses compositionality and depend...
Jørn Lind-Nielsen, Henrik Reif Andersen, Ge...
CISC
2007
Springer
155views Cryptology» more  CISC 2007»
15 years 1 months ago
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
Abstract. In this paper, we propose a signcryption scheme which provides all the following properties at the same time. (1) forward security: the private key of a sender does not h...
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
81
Voted
PTS
2008
98views Hardware» more  PTS 2008»
14 years 11 months ago
Modular System Verification by Inference, Testing and Reachability Analysis
Verification of a modular system composed of communicating components is a difficult problem, especially when the models of the components are not available. Conventional testing t...
Roland Groz, Keqin Li 0002, Alexandre Petrenko, Mu...
BIOCOMP
2006
14 years 11 months ago
Learning Genetic and Gene Bayesian Networks with Hidden Variables: Bilayer Verification Algorithm
To improve the recovery of gene-gene and marker-gene (eQTL) interaction networks from microarray and genetic data, we propose a new procedure for learning Bayesian networks. This a...
Jason E. Aten