Sciweavers

165 search results - page 20 / 33
» Specification patterns can be formal and still easy
Sort
View
SPIN
1999
Springer
15 years 1 months ago
Model Checking for Managers
Model checking is traditionally applied to computer system design. It has proven to be a valuable technique. However, it requires detailed specifications of systems and requirement...
Wil Janssen, Radu Mateescu, Sjouke Mauw, Peter Fen...
VTS
1997
IEEE
73views Hardware» more  VTS 1997»
15 years 1 months ago
Obtaining High Fault Coverage with Circular BIST Via State Skipping
Despite all of the advantages that circular BIST ofsers compared to conventional BIST approaches in terms of low area overhead, simple control logic, and easy insertion, it has se...
Nur A. Touba
TVLSI
2002
111views more  TVLSI 2002»
14 years 9 months ago
Circular BIST with state skipping
Circular built-in self-test (BIST) is a "test per clock" scheme that offers many advantages compared with conventional BIST approaches in terms of low area overhead, simp...
Nur A. Touba
CORR
2010
Springer
103views Education» more  CORR 2010»
14 years 9 months ago
Robust Matrix Decomposition with Outliers
Suppose a given observation matrix can be decomposed as the sum of a low-rank matrix and a sparse matrix (outliers), and the goal is to recover these individual components from th...
Daniel Hsu, Sham M. Kakade, Tong Zhang
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 7 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano