Sciweavers

453 search results - page 53 / 91
» Using Symbolic Simulation for Bounded Property Checking
Sort
View
ICRA
2006
IEEE
94views Robotics» more  ICRA 2006»
15 years 5 months ago
Totally Distributed Motion Control of Sphere World Multi-agent Systems using Decentralized Navigation Functions
— A distributed feedback control architecture that guarantees collision avoidance and destination convergence for multiple sphere world holonomic agents is presented. The well es...
Dimos V. Dimarogonas, Kostas J. Kyriakopoulos, Dim...
ICASSP
2011
IEEE
14 years 3 months ago
A Lagrangian dual relaxation approach to ML MIMO detection: Reinterpreting regularized lattice decoding
This paper describes a new approximate maximum-likelihood (ML) MIMO detection approach by studying a Lagrangian dual relaxation (LDR) of ML. Unlike many existing relaxed ML method...
Jiaxian Pan, Wing-Kin Ma
ATVA
2007
Springer
150views Hardware» more  ATVA 2007»
15 years 3 months ago
3-Valued Circuit SAT for STE with Automatic Refinement
Abstract. Symbolic Trajectory Evaluation (STE) is a powerful technique for hardware model checking. It is based on a 3-valued symbolic simulation, using 0,1 and X n"), where t...
Orna Grumberg, Assaf Schuster, Avi Yadgar
110
Voted
ISSTA
1996
ACM
15 years 4 months ago
Elements of Style: Analyzing a Software Design Feature with a Counterexample Detector
We illustrate the application of Nitpick, a specification checker, to the design of a style mechanism for a word processor. The design is cast, along with some expected properties...
Daniel Jackson, Craig Damon
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 3 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal