Sciweavers

2903 search results - page 36 / 581
» On the univalence of an integral operator
Sort
View
ICCAD
1994
IEEE
110views Hardware» more  ICCAD 1994»
15 years 6 months ago
Test pattern generation based on arithmetic operations
Existing built-in self test (BIST) strategies require the use of specialized test pattern generation hardware which introduces signi cant area overhead and performance degradation...
Sanjay Gupta, Janusz Rajski, Jerzy Tyszer
COOPIS
2004
IEEE
15 years 5 months ago
Supporting Similarity Operations Based on Approximate String Matching on the Web
Querying and integrating sources of structured data from the Web in most cases requires similarity-based concepts to deal with data level conflicts. This is due to the often errone...
Eike Schallehn, Ingolf Geist, Kai-Uwe Sattler
CORR
2008
Springer
69views Education» more  CORR 2008»
15 years 2 months ago
TellTable Spreadsheet Audit: from Technical Possibility to Operating Prototype
At the 2003 EuSpRIG meeting, we presented a framework and software infrastructure to generate and analyse an audit trail for a spreadsheet file. This report describes the results ...
John C. Nash, Andy Adler, Neil Smith
ENTCS
2008
94views more  ENTCS 2008»
15 years 2 months ago
A Formal Model of Memory Peculiarities for the Verification of Low-Level Operating-System Code
This paper presents our solutions to some problems we encountered in an ongoing attempt to verify the micro-hypervisor currently developed within the Robin project. The problems t...
Hendrik Tews, Tjark Weber, Marcus Völp
ASPLOS
2008
ACM
15 years 4 months ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...