Sciweavers

504 search results - page 21 / 101
» Explaining Verification Conditions
Sort
View
CSJM
2008
65views more  CSJM 2008»
13 years 6 months ago
A New Attempt On The F5 Criterion
Faug`ere's criterion used in the F5 algorithm is still not understand and thus there are not many implementations of this algorithm. We state its proof using syzygies to expl...
Christian Eder
DAC
1997
ACM
13 years 11 months ago
Formal Verification of a Superscalar Execution Unit
Abstract. Many modern systems are designed as a set of interconnected reactive subsystems. The subsystem verification task is to verify an implementation of the subsystem against t...
Kyle L. Nelson, Alok Jain, Randal E. Bryant
SIGSOFT
2008
ACM
14 years 8 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
AVBPA
2003
Springer
171views Biometrics» more  AVBPA 2003»
14 years 1 months ago
Illumination Normalization Using Logarithm Transforms for Face Authentication
Abstract. In this paper we propose an algorithm that can easily be implemented on small form factor devices to perform illumination normalization in face images captured under vari...
Marios Savvides, B. V. K. Vijaya Kumar
CAV
2008
Springer
80views Hardware» more  CAV 2008»
13 years 9 months ago
Ranking Automata and Games for Prioritized Requirements
Requirements of reactive systems are usually specified by classifying system executions as desirable and undesirable. To specify prioritized requirements, we propose to associate a...
Rajeev Alur, Aditya Kanade, Gera Weiss