Sciweavers

4340 search results - page 729 / 868
» Formal Methods and Cryptography
Sort
View
151
Voted
PRDC
2006
IEEE
15 years 11 months ago
Detecting and Exploiting Symmetry in Discrete-state Markov Models
Dependable systems are usually designed with multiple instances of components or logical processes, and often possess symmetries that may be exploited in model-based evaluation. T...
W. Douglas Obal II, Michael G. McQuinn, William H....
WIOPT
2006
IEEE
15 years 11 months ago
Online association policies in IEEE 802.11 WLANs
Abstract— In this paper, we study the performance of clientAccess Point (AP) association policies in IEEE 802.11 based WLANs. In many scenarios, clients have a choice of APs with...
Gaurav Kasbekar, Joy Kuri, Pavan Nuggehalli
ACL2
2006
ACM
15 years 11 months ago
Reasoning about ACL2 file input
We introduce the logical story behind file input in ACL2 and discuss the types of theorems that can be proven about filereading operations. We develop a low level library for re...
Jared Davis
CASES
2006
ACM
15 years 10 months ago
Memory optimization by counting points in integer transformations of parametric polytopes
Memory size reduction and memory accesses optimization are crucial issues for embedded systems. In the context of affine programs, these two challenges are classically tackled by ...
Rachid Seghir, Vincent Loechner
DAC
2006
ACM
15 years 10 months ago
Buffer memory optimization for video codec application modeled in Simulink
Reduction of the on-chip memory size is a key issue in video codec system design. Because video codec applications involve complex algorithms that are both data-intensive and cont...
Sang-Il Han, Xavier Guerin, Soo-Ik Chae, Ahmed Ami...