Sciweavers

936 search results - page 141 / 188
» FSM-Hume is finite state
Sort
View
ICC
2007
IEEE
137views Communications» more  ICC 2007»
14 years 4 months ago
A Novel Algorithm and Architecture for High Speed Pattern Matching in Resource-Limited Silicon Solution
— Network Intrusion Detection Systems (NIDS) are more and more important for identifying and preventing the malicious attacks over the network. This paper proposes a novel cost-e...
Nen-Fu Huang, Yen-Ming Chu, Chi-Hung Tsai, Chen-Yi...
WECWIS
2003
IEEE
106views ECommerce» more  WECWIS 2003»
14 years 3 months ago
Contract Representation for Run-time Monitoring and Enforcement
Converting a conventional contract into an electronic equivalent that can be executed and enforced by computers is a challenging task. The difficulties are caused by the ambiguiti...
Carlos Molina-Jiménez, Santosh K. Shrivasta...
IPPS
1999
IEEE
14 years 2 months ago
Mechanical Verification of a Garbage Collector
Abstract. We describe how the PVS verification system has been used to verify a safety property of a garbage collection algorithm, originally suggested by Ben-Ari. The safety prope...
Klaus Havelund
FPL
1999
Springer
147views Hardware» more  FPL 1999»
14 years 2 months ago
Synthia: Synthesis of Interacting Automata Targeting LUT-based FPGAs
This paper details the development, implementation, and results of Synthia, a system for the synthesis of Finite State Machines (FSMs) to field-programmable logic. Our approach us...
George A. Constantinides, Peter Y. K. Cheung, Wayn...
APLAS
2003
ACM
14 years 1 months ago
Resource Usage Verification
We investigate how to automatically verify that resources such as files are not used improperly or unsafely by a program. We employ a mixture of compile-time analysis and run-time ...
Kim Marriott, Peter J. Stuckey, Martin Sulzmann