Sciweavers

2019 search results - page 288 / 404
» Programming with Shared Data Abstractions
Sort
View
UTP
2010
14 years 7 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
PASTE
2005
ACM
15 years 3 months ago
Generalizing symbolic execution to library classes
Forward symbolic execution is a program analysis technique that allows using symbolic inputs to explore program executions. The traditional applications of this technique have foc...
Sarfraz Khurshid, Yuk Lai Suen
DATE
2007
IEEE
100views Hardware» more  DATE 2007»
15 years 4 months ago
SoC testing using LFSR reseeding, and scan-slice-based TAM optimization and test scheduling
Abstract— We present an SoC testing approach that integrates test data compression, TAM/test wrapper design, and test scheduling. An improved LFSR reseeding technique is used as ...
Zhanglei Wang, Krishnendu Chakrabarty, Seongmoon W...
ICC
2007
IEEE
149views Communications» more  ICC 2007»
15 years 4 months ago
1+N Protection Against Multiple Link Failures in Mesh Networks
Abstract—In [1], the author presented a 1+N protection strategy against single link failures using a network coding approach on p-Cycles. In this paper, we extend this approach t...
Ahmed E. Kamal
ISCAS
2006
IEEE
87views Hardware» more  ISCAS 2006»
15 years 3 months ago
NoC monitoring: impact on the design flow
Abstract— Networks-on-chip (NoCs) are a scalable interconnect solution to large scale multiprocessor systems on chip and are rapidly becoming reality. As the ratio of embedded co...
Calin Ciordas, Kees Goossens, Andrei Radulescu, Tw...