Sciweavers

501 search results - page 57 / 101
» Using Abstraction to Verify Arbitrary Temporal Properties
Sort
View
CAIP
1999
Springer
143views Image Analysis» more  CAIP 1999»
15 years 2 months ago
Frame-Relative Critical Point Sets in Image Analysis
Abstract. We propose a new computational method for segmenting topological sub-dimensional point-sets in scalar images of arbitrary spatial dimensions. The technique is based on co...
Stiliyan Kalitzin, Joes Staal, Bart M. ter Haar Ro...
JCT
2011
93views more  JCT 2011»
14 years 18 days ago
A graph-theoretic approach to quasigroup cycle numbers
Abstract. Norton and Stein associated a number with each idempotent quasigroup or diagonalized Latin square of given finite order n, showing that it is congruent mod 2 to the tria...
Brent Kerby, Jonathan D. H. Smith
ENTCS
2007
85views more  ENTCS 2007»
14 years 9 months ago
Stochastic Modelling of Communication Protocols from Source Code
A major development in qualitative model checking was the jump to verifying properties of source code directly, rather than requiring a separately specified model. We describe an...
Michael J. A. Smith
ASYNC
1999
IEEE
110views Hardware» more  ASYNC 1999»
15 years 2 months ago
Verification of Delayed-Reset Domino Circuits Using ATACS
This paper discusses the application of the timing analysis tool ATACS to the high performance, self-resetting and delayed-reset domino circuits being designed at IBM's Austi...
Wendy Belluomini, Chris J. Myers, H. Peter Hofstee
JHSN
2006
267views more  JHSN 2006»
14 years 9 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...