Sciweavers

401 search results - page 69 / 81
» Formal Analysis of Meeting Protocols
Sort
View
ISARCS
2010
141views Hardware» more  ISARCS 2010»
14 years 2 months ago
Integrating Fault-Tolerant Techniques into the Design of Critical Systems
Abstract. Software designs equipped with specification of dependability techniques can help engineers to develop critical systems. In this work, we start to envision how a softwar...
Ricardo J. Rodríguez, José Merseguer
PR
2006
84views more  PR 2006»
13 years 10 months ago
Clustering techniques for protein surfaces
Though most approaches to protein comparison are based on their structure, several studies produced evidence of a strict correlation between the surface characteristics of protein...
Lorenzo Baldacci, Matteo Golfarelli, Alessandra Lu...
COMCOM
2007
125views more  COMCOM 2007»
13 years 10 months ago
Guaranteeing the network lifetime in wireless sensor networks: A MAC layer approach
Energy is the most crucial but scarce resource in wireless sensor networks (WSNs). A wealth of MAC protocols are proposed only to prolong the network lifetime for energy-efficienc...
Yongsub Nam, Taekyoung Kwon, Hojin Lee, Hakyung Ju...
DAC
2005
ACM
14 years 11 months ago
IODINE: a tool to automatically infer dynamic invariants for hardware designs
We describe IODINE, a tool to automatically extract likely design properties using dynamic analysis. A practical bottleneck in the formal verification of hardware designs is the n...
Sudheendra Hangal, Naveen Chandra, Sridhar Narayan...
VLSID
2002
IEEE
152views VLSI» more  VLSID 2002»
14 years 10 months ago
Verification of an Industrial CC-NUMA Server
Directed test program-based verification or formal verification methods are usually quite ineffective on large cachecoherent, non-uniform memory access (CC-NUMA) multiprocessors b...
Rajarshi Mukherjee, Yozo Nakayama, Toshiya Mima