Sciweavers

1036 search results - page 117 / 208
» Verification Programs for Abduction
Sort
View
ISSTA
2006
ACM
15 years 10 months ago
Performance assertions for mobile devices
Assertions have long been used to validate the functionality of software systems. Researchers and practitioners have extended them for validation of non-functional requirements, s...
Raimondas Lencevicius, Edu Metz
ICCAD
1999
IEEE
99views Hardware» more  ICCAD 1999»
15 years 8 months ago
FunState - an internal design representation for codesign
In this paper, an internal design model called FunState (functions driven by state machines) is presented that enables the representation of different types of system components a...
Lothar Thiele, Karsten Strehl, Dirk Ziegenbein, Ro...
CP
2006
Springer
15 years 8 months ago
A New Algorithm for Sampling CSP Solutions Uniformly at Random
The paper presents a method for generating solutions of a constraint satisfaction problem (CSP) uniformly at random. The main idea is to express the CSP as a factored probability d...
Vibhav Gogate, Rina Dechter
TACAS
2000
Springer
89views Algorithms» more  TACAS 2000»
15 years 8 months ago
The PROSPER Toolkit
Abstract. The Prosper (Proof and Specification Assisted Design Environments) project advocates the use of toolkits which allow existing verification tools to be adapted to a more f...
Louise A. Dennis, Graham Collins, Michael Norrish,...
ECBS
2007
IEEE
188views Hardware» more  ECBS 2007»
15 years 6 months ago
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...