Sciweavers

3130 search results - page 279 / 626
» Design Correctness of Digital Systems
Sort
View
VMCAI
2004
Springer
15 years 10 months ago
Applying Jlint to Space Exploration Software
Abstract. Java is a very successful programming language which is also becoming widespread in embedded systems, where software correctness is critical. Jlint is a simple but highly...
Cyrille Artho, Klaus Havelund
CCS
2008
ACM
15 years 6 months ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
151
Voted
ISQED
2011
IEEE
230views Hardware» more  ISQED 2011»
14 years 8 months ago
Constraint generation for software-based post-silicon bug masking with scalable resynthesis technique for constraint optimizatio
Due to the dramatic increase in design complexity, verifying the functional correctness of a circuit is becoming more difficult. Therefore, bugs may escape all verification effo...
Chia-Wei Chang, Hong-Zu Chou, Kai-Hui Chang, Jie-H...
ICDS
2007
IEEE
15 years 11 months ago
Automatic Acquisition of Translation Knowledge Using Structural Matching Between Parse Trees
— In this paper we present a rule-based formalism for the representation, acquisition, and application of translation knowledge. The formalism is being used successfully in a Jap...
Werner Winiwarter
KDD
1999
ACM
142views Data Mining» more  KDD 1999»
15 years 9 months ago
Mining GPS Data to Augment Road Models
Many advanced safety and navigation applications in vehicles require accurate, detailed digital maps, but manual lane measurements are expensive and time-consuming, making automat...
Seth Rogers, Pat Langley, Christopher Wilson