Sciweavers

372 search results - page 34 / 75
» Transaction Based Modeling and Verification of Hardware Prot...
Sort
View
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 2 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
DAC
2007
ACM
15 years 1 months ago
Verification Methodologies in a TLM-to-RTL Design Flow
SoC based system developments commonly employ ESL design ogies and utilize multiple levels of abstract models to provide feasibility study models for architects and development pl...
Atsushi Kasuya, Tesh Tesfaye
CAV
2006
Springer
95views Hardware» more  CAV 2006»
15 years 1 months ago
Yasm: A Software Model-Checker for Verification and Refutation
Example Guided Abstraction Refinement (CEGAR) [6] framework. A number of wellengineered software model-checkers are available, e.g., SLAM [1] and BLAST [12]. Why build another one?...
Arie Gurfinkel, Ou Wei, Marsha Chechik
SIGMETRICS
2008
ACM
14 years 9 months ago
A view-probability-matrix approach to the modelling of gossiping protocols
This paper addresses the quantitative analysis of gossiping protocols. In contrast to existing approaches which are entirely based on the simulation of the individual nodes' ...
Thomas Krieger, Martin Riedl, Johann Schuster, Mar...
54
Voted
ISCAS
2007
IEEE
113views Hardware» more  ISCAS 2007»
15 years 4 months ago
A Circuit-Based Noise Parameter Extraction Technique for MOSFETs
Experimental verification of noise models is one of the major challenges in noise modeling. A circuit-based noise characterization technique is introduced which uses phase noise me...
Reza Navid, Thomas H. Lee, Robert W. Dutton