Sciweavers

5525 search results - page 218 / 1105
» Verification of Model Transformations
Sort
View
122
Voted
GECCO
1999
Springer
15 years 8 months ago
Challenges with Verification, Repeatability, and Meaningful Comparison in Genetic Programming: Gibson's Magic
This paper examines some of the reporting and research practices concerning empirical work in genetic programming. We describe several common loopholes and offer three case studie...
Jason M. Daida, Derrick S. Ampy, Michael Ratanasav...
114
Voted
CAV
1998
Springer
86views Hardware» more  CAV 1998»
15 years 8 months ago
Formal Verification of Out-of-Order Execution Using Incremental Flushing
We present a two-part approach for verifying out-of-order execution. First, the complexity of out-of-order issue and scheduling is handled by creating der abstraction of the out-of...
Jens U. Skakkebæk, Robert B. Jones, David L....
149
Voted
DASC
2006
IEEE
15 years 7 months ago
Runtime Security Verification for Itinerary-Driven Mobile Agents
We present a new approach to ensure the secure execution of itinerary-driven mobile agents, in which the specification of the navigational behavior of an agent is separated from t...
Zijiang Yang, Shiyong Lu, Ping Yang
AMAST
2008
Springer
15 years 5 months ago
The Verification of the On-Chip COMA Cache Coherence Protocol
This paper gives a correctness proof for the on-chip COMA cache coherence protocol that supports the Microgrid of microtheaded architecture, a multi-core architecture capable of in...
Thuy Duong Vu, Li Zhang, Chris R. Jesshope
WOTUG
2008
15 years 5 months ago
Mechanical Verification of a Two-Way Sliding Window Protocol
Abstract. We prove the correctness of a two-way sliding window protocol with piggybacking, where the acknowledgments of the latest received data are attached to the next data trans...
Bahareh Badban, Wan Fokkink, Jaco van de Pol