Sciweavers

12289 search results - page 2143 / 2458
» computing 2006
Sort
View
129
Voted
CASES
2006
ACM
15 years 8 months ago
Incremental elaboration for run-time reconfigurable hardware designs
We present a new technique for compiling run-time reconfigurable hardware designs. Run-time reconfigurable embedded systems can deliver promising benefits over implementations in ...
Arran Derbyshire, Tobias Becker, Wayne Luk
CAV
2006
Springer
116views Hardware» more  CAV 2006»
15 years 8 months ago
Lazy Shape Analysis
Abstract. Many software model checkers are based on predicate abstraction. If the verification goal depends on pointer structures, the approach does not work well, because it is di...
Dirk Beyer, Thomas A. Henzinger, Grégory Th...
CAV
2006
Springer
141views Hardware» more  CAV 2006»
15 years 8 months ago
SMT Techniques for Fast Predicate Abstraction
niques for Fast Predicate Abstraction Shuvendu K. Lahiri , Robert Nieuwenhuis , and Albert Oliveras Abstract. Predicate abstraction is a technique for automatically exfinite-state ...
Shuvendu K. Lahiri, Robert Nieuwenhuis, Albert Oli...
CC
2006
Springer
15 years 8 months ago
Interprocedural Dataflow Analysis in the Presence of Large Libraries
Interprocedural dataflow analysis has a large number of uses for software optimization, maintenance, testing, and verification. For software built with reusable components, the tra...
Atanas Rountev, Scott Kagan, Thomas J. Marlowe
CCS
2006
ACM
15 years 8 months ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
« Prev « First page 2143 / 2458 Last » Next »