Sciweavers

4340 search results - page 185 / 868
» Formal Methods and Cryptography
Sort
View
ICCD
2004
IEEE
137views Hardware» more  ICCD 2004»
16 years 1 months ago
Comparative Study of Strategies for Formal Verification of High-Level Processors
Compared are different methods for evaluation of formulas expressing microprocessor correctness in the logic of Equality with Uninterpreted Functions and Memories (EUFM) by transl...
Miroslav N. Velev
IWPC
2007
IEEE
15 years 10 months ago
Combining Formal Concept Analysis with Information Retrieval for Concept Location in Source Code
The paper addresses the problem of concept location in source code by presenting an approach which combines Formal Concept Analysis (FCA) and Latent Semantic Indexing (LSI). In th...
Denys Poshyvanyk, Andrian Marcus
WDAG
2007
Springer
63views Algorithms» more  WDAG 2007»
15 years 10 months ago
A Formal Analysis of the Deferred Update Technique
The deferred update technique is a widely used approach for building replicated database systems. Its fame stems from the fact that read-only transactions can execute locally to a...
Rodrigo Schmidt, Fernando Pedone
PLDI
2005
ACM
15 years 10 months ago
Formal loop merging for signal transforms
A critical optimization in the domain of linear signal transforms, such as the discrete Fourier transform (DFT), is loop merging, which increases data locality and reuse and thus ...
Franz Franchetti, Yevgen Voronenko, Markus Pü...
APN
2004
Springer
15 years 9 months ago
Time Petri Nets with Inhibitor Hyperarcs. Formal Semantics and State Space Computation
Abstract. In this paper, we define Time Petri Nets with Inhibitor Hyperarcs (IHTPN) as an extension of T-time Petri nets where time is associated with transitions. In this model, ...
Olivier H. Roux, Didier Lime