Sciweavers

598 search results - page 37 / 120
» Efficient and User-Friendly Verification
Sort
View
ACSD
1998
IEEE
90views Hardware» more  ACSD 1998»
15 years 4 months ago
Verification of Pipelined Microprocessors by Correspondence Checking in Symbolic Ternary Simulation
This paper makes the idea of memory shadowing [5] applicable to symbolic ternary simulation. Memory shadowing, an extension of Burch and Dill's pipeline verification method [...
Miroslav N. Velev, Randal E. Bryant
TACAS
1998
Springer
105views Algorithms» more  TACAS 1998»
15 years 4 months ago
Verification of Large State/Event Systems Using Compositionality and Dependency Analysis
A state/event model is a concurrent version of Mealy machines used for describing embedded reactive systems. This paper introduces a technique that uses compositionality and depend...
Jørn Lind-Nielsen, Henrik Reif Andersen, Ge...
CISC
2007
Springer
155views Cryptology» more  CISC 2007»
15 years 3 months ago
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
Abstract. In this paper, we propose a signcryption scheme which provides all the following properties at the same time. (1) forward security: the private key of a sender does not h...
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
PTS
2008
98views Hardware» more  PTS 2008»
15 years 1 months ago
Modular System Verification by Inference, Testing and Reachability Analysis
Verification of a modular system composed of communicating components is a difficult problem, especially when the models of the components are not available. Conventional testing t...
Roland Groz, Keqin Li 0002, Alexandre Petrenko, Mu...
BIOCOMP
2006
15 years 1 months ago
Learning Genetic and Gene Bayesian Networks with Hidden Variables: Bilayer Verification Algorithm
To improve the recovery of gene-gene and marker-gene (eQTL) interaction networks from microarray and genetic data, we propose a new procedure for learning Bayesian networks. This a...
Jason E. Aten