Sciweavers

2513 search results - page 292 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
122
Voted
IJCNN
2006
IEEE
15 years 6 months ago
A Connectionist Approach to Speech Understanding
— This paper argues that connectionist systems are a good approach to implement a speech understanding computational model. In this direction, we propose SUM, a Speech Understand...
Daniel Nehme Müller, Mozart Lemos de Siqueira...
101
Voted
DATE
2002
IEEE
108views Hardware» more  DATE 2002»
15 years 5 months ago
Networks on Silicon: Combining Best-Effort and Guaranteed Services
We advocate a network on silicon (NOS) as a hardware architecture to implement communication between IP cores in future technologies, and as a software model in the form of a prot...
Kees G. W. Goossens, Paul Wielage, Ad M. G. Peeter...
91
Voted
VMCAI
2009
Springer
15 years 7 months ago
Towards Automatic Stability Analysis for Rely-Guarantee Proofs
The Rely-Guarantee approach is a well-known compositional method for proving Hoare logic properties of concurrent programs. In this approach, predicates in the proof must be proved...
Hasan Amjad, Richard Bornat
FATES
2003
Springer
15 years 6 months ago
Automatic Conformance Testing of Internet Applications
Abstract. We adapt and extend the theories used in the general framework of automated software testing in such a way that they become suitable for black-box conformance testing of ...
Harm M. A. van Beek, Sjouke Mauw
85
Voted
TASE
2007
IEEE
15 years 7 months ago
Evaluation of SAT-based Bounded Model Checking of ACTL Properties
Bounded model checking (BMC) based on SAT has been introduced as a complementary method to BDD-based symbolic model checking of LTL and ACTL properties in recent years. For genera...
Yanyan Xu, Wei Chen, Liang Xu, Wenhui Zhang