Sciweavers

313 search results - page 19 / 63
» Error Correction Based on Verification Techniques
Sort
View
FAC
2008
80views more  FAC 2008»
14 years 9 months ago
Verification of Mondex electronic purses with KIV: from transactions to a security protocol
The Mondex case study about the specification and refinement of an electronic purse as defined in the Oxford Technical Monograph PRG-126 has recently been proposed as a challenge f...
Dominik Haneberg, Gerhard Schellhorn, Holger Grand...
ICIP
2004
IEEE
15 years 11 months ago
Statistical transformations of frontal models for non-frontal face verification
In the framework of a face verification system using local features and a Gaussian Mixture Model based classifier, we address the problem of non-frontal face verification (when on...
Conrad Sanderson, Samy Bengio
68
Voted
PLPV
2010
ACM
14 years 11 months ago
Challenge benchmarks for verification of real-time programs
Real-time systems, and in particular safety-critical systems, are a rich source of challenges for the program verification community as software errors can have catastrophic conse...
Tomás Kalibera, Pavel Parizek, Ghaith Hadda...
ICCAD
2007
IEEE
107views Hardware» more  ICCAD 2007»
15 years 6 months ago
Computation of minimal counterexamples by using black box techniques and symbolic methods
— Computing counterexamples is a crucial task for error diagnosis and debugging of sequential systems. If an implementation does not fulfill its specification, counterexamples ...
Tobias Nopper, Christoph Scholl, Bernd Becker
DSD
2008
IEEE
147views Hardware» more  DSD 2008»
14 years 11 months ago
A Low-Cost Cache Coherence Verification Method for Snooping Systems
Due to modern technology trends such as decreasing feature sizes and lower voltage levels, fault tolerance is becoming increasingly important in computing systems. Shared memory i...
Demid Borodin, Ben H. H. Juurlink