Sciweavers

313 search results - page 20 / 63
» Error Correction Based on Verification Techniques
Sort
View
ASPDAC
2006
ACM
141views Hardware» more  ASPDAC 2006»
15 years 1 months ago
Depth-driven verification of simultaneous interfaces
The verification of modern computing systems has grown to dominate the cost of system design, often with limited success as designs continue to be released with latent bugs. This t...
Ilya Wagner, Valeria Bertacco, Todd M. Austin
OSDI
2006
ACM
15 years 10 months ago
EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors
Storage systems such as file systems, databases, and RAID systems have a simple, basic contract: you give them data, they do not lose or corrupt it. Often they store the only copy...
Junfeng Yang, Can Sar, Dawson R. Engler
CP
2008
Springer
14 years 11 months ago
CPBPV: A Constraint-Programming Framework for Bounded Program Verification
Abstract. This paper studies how to verify the conformity of a program with its specification and proposes a novel constraint-programming framework for bounded program verification...
Hélène Collavizza, Michel Rueher, Pa...
ICB
2009
Springer
144views Biometrics» more  ICB 2009»
15 years 4 months ago
Parts-Based Face Verification Using Local Frequency Bands
ic Presentations - Abstracts list Monday, August 31st Session 1 – Chairman: Jean-Marc Odobez Title Quality Measures and Stacking Classifiers in Multimodal Biometric Recognition S...
Chris McCool, Sébastien Marcel
88
Voted
ICCAD
1996
IEEE
141views Hardware» more  ICCAD 1996»
15 years 1 months ago
An observability-based code coverage metric for functional simulation
Functional simulation is the most widely used method for design verification. At various levels of abstraction, e.g., behavioral, register-transfer level and gate level, the design...
Srinivas Devadas, Abhijit Ghosh, Kurt Keutzer