Sciweavers

1463 search results - page 200 / 293
» Model Checking Implicit-Invocation Systems
Sort
View
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
15 years 3 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
MICRO
2008
IEEE
137views Hardware» more  MICRO 2008»
15 years 1 months ago
Verification of chip multiprocessor memory systems using a relaxed scoreboard
Verification of chip multiprocessor memory systems remains challenging. While formal methods have been used to validate protocols, simulation is still the dominant method used to ...
Ofer Shacham, Megan Wachs, Alex Solomatnikov, Amin...
ADAEUROPE
2005
Springer
15 years 7 months ago
Extending Ravenscar with CSP Channels
Abstract. The Ravenscar Profile is a restricted subset of the Ada tasking model, designed to meet the requirements of producing analysable and deterministic code. A central featur...
Diyaa-Addein Atiya, Steve King
DATE
2004
IEEE
129views Hardware» more  DATE 2004»
15 years 5 months ago
On the Design and Verification Methodology of the Look-Aside Interface
In this paper, we present a technique to design and verify the Look-Aside (LA-1) Interface standard used in network processors. Our design flow includes several refinements starti...
Ali Habibi, Asif Iqbal Ahmed, Otmane Aït Moha...
SIAMAM
2008
119views more  SIAMAM 2008»
15 years 1 months ago
The Chapman--Jouguet Closure for the Riemann Problem with Vaporization
This work is devoted to the modelling of phase transition. The thermodynamic model for phase transition chosen is a model with two equations of state, each of them modelling one p...
Vincent Perrier