Sciweavers

1516 search results - page 209 / 304
» Trends in Software Verification
Sort
View
CADE
2006
Springer
15 years 10 months ago
Tree Automata with Equality Constraints Modulo Equational Theories
This paper presents new classes of tree automata combining automata with equality test and automata modulo equational theories. We believe that these classes have a good potential ...
Florent Jacquemard, Laurent Vigneron, Michaël...
DATE
2008
IEEE
167views Hardware» more  DATE 2008»
15 years 4 months ago
Accuracy-Adaptive Simulation of Transaction Level Models
Simulation of transaction level models (TLMs) is an established embedded systems design technique. Its use cases include virtual prototyping for early software development, platfo...
Martin Radetzki, Rauf Salimi Khaligh
DSN
2007
IEEE
15 years 4 months ago
Assurance Based Development of Critical Systems
  Assurance Based Development (ABD) is the synergistic construction of a critical computing system and an  assurance  case  that  sets  out  the  dependabilit...
Patrick J. Graydon, John C. Knight, Elisabeth A. S...
ITNG
2007
IEEE
15 years 4 months ago
Human Computer Interaction Based Intrusion Detection
—In this paper we survey the state of the art in direct and indirect human computer interaction based biometrics. Direct HCI biometrics are based on abilities, style, preference,...
Roman V. Yampolskiy
ICCAD
2006
IEEE
146views Hardware» more  ICCAD 2006»
15 years 3 months ago
Cost-aware synthesis of asynchronous circuits based on partial acknowledgement
Designing asynchronous circuits by reusing existing synchronous tools has become a promising solution to the problem of poor CAD support in asynchronous world. A straightforward w...
Yu Zhou, Danil Sokolov, Alexandre Yakovlev