Sciweavers

139 search results - page 7 / 28
» Totally Verified Systems: Linking Verified Software to Verif...
Sort
View
ICC
2007
IEEE
15 years 3 months ago
Call-Level Performance Modelling of Elastic and Adaptive Service-Classes
—We propose a new teletraffic model for the calculation of link occupancy distribution and determine the call blocking probabilities and link utilization in a single-link multi-r...
Vassilios G. Vassilakis, Ioannis D. Moscholios, Mi...
DATE
2003
IEEE
96views Hardware» more  DATE 2003»
15 years 2 months ago
A System to Validate and Certify Soft and Hard IP
With the increasing use of Intellectual Property (IP) in the semiconductor industry, the demand to verify IP for quality is high. This paper describes ipscreen, a software tool th...
Bernard Laurent, Thierry Karger
DATE
2008
IEEE
121views Hardware» more  DATE 2008»
15 years 3 months ago
Quantitative Evaluation in Embedded System Design: Validation of Multiprocessor Multithreaded Architectures
As levels of parallelism are becoming increasingly complex in multiprocessor architectures, GALS, and asynchronous circuits, methodologies and software tools are needed to verify ...
Nicolas Coste, Hubert Garavel, Holger Hermanns, Ri...
ICSE
2007
IEEE-ACM
15 years 9 months ago
DECIMAL and PLFaultCAT: From Product-Line Requirements to Product-Line Member Software Fault Trees
PLFaultCAT is a tool for software fault tree analysis (SFTA) during product-line engineering. When linked with DECIMAL, a product-line requirements verification tool, the enhanced...
Josh Dehlinger, Meredith Humphrey, Lada Suvorov, P...
SP
2005
IEEE
183views Security Privacy» more  SP 2005»
15 years 3 months ago
A Generic Attack on Checksumming-Based Software Tamper Resistance
Self-checking software tamper resistance mechanisms employing checksums, including advanced systems as recently proposed by Chang and Atallah (2002) and Horne et al. (2002), have ...
Glenn Wurster, Paul C. van Oorschot, Anil Somayaji