Sciweavers

851 search results - page 66 / 171
» History Effects and Verification
Sort
View
DAC
2006
ACM
16 years 25 days ago
Predicate learning and selective theory deduction for a difference logic solver
Design and verification of systems at the Register-Transfer (RT) or behavioral level require the ability to reason at higher levels of abstraction. Difference logic consists of an...
Chao Wang, Aarti Gupta, Malay K. Ganai
SIGSOFT
2009
ACM
16 years 18 days ago
Symbolic pruning of concurrent program executions
We propose a new algorithm for verifying concurrent programs, which uses concrete executions to partition the program into a set of lean partitions called concurrent trace program...
Chao Wang, Swarat Chaudhuri, Aarti Gupta, Yu Yang
IEAAIE
1995
Springer
15 years 3 months ago
Modelling Hybrid Rule/Frame-Based Expert Systems Using Coloured Petri Nets
High level Petri Nets have recently been used for many AI applications, particularly for modelling traditional rule-based expert systems. The major effect is to facilitate the ana...
Simon C. K. Shiu, James N. K. Liu, Daniel S. Yeung
ASPDAC
2008
ACM
168views Hardware» more  ASPDAC 2008»
15 years 1 months ago
A fast two-pass HDL simulation with on-demand dump
- Simulation-based functional verification is characterized by two inherently conflicting targets: the signal visibility and simulation performance. Achieving a proper trade-off be...
Kyuho Shim, Youngrae Cho, Namdo Kim, Hyuncheol Bai...
DBSEC
2010
126views Database» more  DBSEC 2010»
15 years 1 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...