Sciweavers

1886 search results - page 178 / 378
» Verifying and Validating Simulation Models
Sort
View
123
Voted
ACMSE
2006
ACM
15 years 9 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
CAV
1999
Springer
119views Hardware» more  CAV 1999»
15 years 7 months ago
Exploiting Positive Equality in a Logic of Equality with Uninterpreted Functions
Abstract. In using the logic of equality with unininterpreted functions to verify hardware systems, specific characteristics of the formula describing the correctness condition ca...
Randal E. Bryant, Steven M. German, Miroslav N. Ve...
121
Voted
EMSOFT
2008
Springer
15 years 5 months ago
Automatically transforming and relating Uppaal models of embedded systems
Relations between models are important for effective automatic validation, for comparing implementations with specifications, and for increased understanding of embedded systems d...
Timothy Bourke, Arcot Sowmya
121
Voted
ICCAD
2000
IEEE
88views Hardware» more  ICCAD 2000»
15 years 7 months ago
Hierarchical Interconnect Circuit Models
The increasing size of integrated systems combined with deep submicron physical modeling details creates an explosion in RLC interconnect modeling complexity of unmanageable propo...
Michael W. Beattie, Satrajit Gupta, Lawrence T. Pi...
PAMI
2010
324views more  PAMI 2010»
15 years 1 months ago
A Compositional and Dynamic Model for Face Aging
—In this paper we present a compositional and dynamic model for face aging. The compositional model represents faces in each age group by a hierarchical And-Or graph, in which An...
Jin-Li Suo, Song Chun Zhu, Shiguang Shan, Xilin Ch...