Sciweavers

399 search results - page 17 / 80
» Efficient Model Checking Using Tabled Resolution
Sort
View
FMCAD
1998
Springer
13 years 11 months ago
Combining Symbolic Model Checking with Uninterpreted Functions for Out-of-Order Processor Verification
We present a new approach to the verification of hardware systems with data dependencies using temporal logic symbolic model checking. As a benchmark we take Tomasulo's algori...
Sergey Berezin, Armin Biere, Edmund M. Clarke, Yun...
DAC
2007
ACM
14 years 8 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
CAV
2007
Springer
114views Hardware» more  CAV 2007»
13 years 11 months ago
Configurable Software Verification: Concretizing the Convergence of Model Checking and Program Analysis
In automatic software verification, we have observed a theoretical convergence of model checking and program analysis. In practice, however, model checkers are still mostly concern...
Dirk Beyer, Thomas A. Henzinger, Grégory Th...
MICCAI
2008
Springer
14 years 8 months ago
MRI Bone Segmentation Using Deformable Models and Shape Priors
Abstract. This paper addresses the problem of automatically segmenting bone structures in low resolution clinical MRI datasets. The novel aspect of the proposed method is the combi...
Jérôme Schmid, Nadia Magnenat-Thalman...
ACSC
2008
IEEE
13 years 9 months ago
An efficient hash-based algorithm for minimal k-anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes of microdata that clearly identify individuals, such a...
Xiaoxun Sun, Min Li, Hua Wang, Ashley W. Plank