Sciweavers

637 search results - page 65 / 128
» Inconsistency-Tolerant Integrity Checking
Sort
View
141
Voted
ATVA
2006
Springer
162views Hardware» more  ATVA 2006»
15 years 7 months ago
Predicate Abstraction of Programs with Non-linear Computation
e Abstraction of Programs With Non-linear Computation Songtao Xia1 Ben Di Vito2 Cesar Munoz3 1 NASA Postdoc at NASA Langley Research Center, Hampton, VA 2 NASA Langley Research Cen...
Songtao Xia, Ben Di Vito, César Muño...
128
Voted
LISA
2003
15 years 5 months ago
Using Service Grammar to Diagnose BGP Configuration Errors
Often network components work correctly, yet end-to-end services don’t. This happens if configuration parameters of components are set to incorrect values. Configuration is a fu...
Xiaohu Qie, Sanjai Narain
125
Voted
ICIP
2002
IEEE
16 years 5 months ago
Semi-fragile image authentication using generic wavelet domain features and ECC
In this paper we present a generic content-based solution targeting at authenticating image in a semi-fragile way, which integrates watermarking-based approach with signature-base...
Qibin Sun, Shih-Fu Chang
CAV
2009
Springer
157views Hardware» more  CAV 2009»
16 years 4 months ago
Explaining Counterexamples Using Causality
Abstract. When a model does not satisfy a given specification, a counterexample is produced by the model checker to demonstrate the failure. A user must then examine the counterexa...
Ilan Beer, Shoham Ben-David, Hana Chockler, Avigai...
139
Voted
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
16 years 4 months ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng