Sciweavers

613 search results - page 26 / 123
» Finding and Fixing Faults
Sort
View
VLSID
2005
IEEE
127views VLSI» more  VLSID 2005»
15 years 5 months ago
Formal Methods for Analyzing the Completeness of an Assertion Suite against a High-Level Fault Model
One of the emerging challenges in formal property verification (FPV) technology is the problem of deciding whether sufficient properties have been written to cover the design in...
Sayantan Das, Ansuman Banerjee, Prasenjit Basu, Pa...
PPL
2008
88views more  PPL 2008»
14 years 11 months ago
The Relaxed-Ring: a Fault-Tolerant Topology for Structured Overlay Networks
Fault-tolerance and lookup consistency are considered crucial properties for building applications on top of structured overlay networks. Many of these networks use the ring topol...
Boris Mejías, Peter Van Roy
BIRTHDAY
2012
Springer
13 years 7 months ago
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
Alexandre Berzati, Cécile Canovas-Dumas, Lo...
SAT
2005
Springer
129views Hardware» more  SAT 2005»
15 years 5 months ago
On Finding All Minimally Unsatisfiable Subformulas
Much attention has been given in recent years to the problem of finding Minimally Unsatisfiable Subformulas (MUSes) of Boolean formulas. In this paper, we present a new view of the...
Mark H. Liffiton, Karem A. Sakallah
SIGMOD
2004
ACM
144views Database» more  SIGMOD 2004»
15 years 12 months ago
Diamond in the Rough: Finding Hierarchical Heavy Hitters in Multi-Dimensional Data
Data items archived in data warehouses or those that arrive online as streams typically have attributes which take values from multiple hierarchies (e.g., time and geographic loca...
Graham Cormode, Flip Korn, S. Muthukrishnan, Dives...