Sciweavers

819 search results - page 76 / 164
» Fractal symbolic analysis
Sort
View
VTS
2003
IEEE
131views Hardware» more  VTS 2003»
14 years 2 months ago
Efficient Implication - Based Untestable Bridge Fault Identifier
: This paper presents a novel, low cost technique based on implications to identify untestable bridging faults in sequential circuits. Sequential symbolic simulation [1] is first p...
Manan Syal, Michael S. Hsiao, Kiran B. Doreswamy, ...
ICIAR
2009
Springer
14 years 1 months ago
Abnormal Behavior Recognition Using Self-Adaptive Hidden Markov Models
A self-adaptive Hidden Markov Model (SA-HMM) based framework is proposed for behavior recognition in this paper. In this model, if an unknown sequence cannot be classified into an...
Jun Yin, Yan Meng
DAS
2010
Springer
14 years 2 days ago
Toward affine recognition of handwritten mathematical characters
We address the problem of handwritten symbol classification in the presence of distortions modeled by affine transformations. We consider shear, rotation, scaling and translation,...
Oleg Golubitsky, Vadim Mazalov, Stephen M. Watt
ESORICS
2010
Springer
13 years 9 months ago
Modeling and Analyzing Security in the Presence of Compromising Adversaries
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
David A. Basin, Cas J. F. Cremers
ENTCS
2006
112views more  ENTCS 2006»
13 years 8 months ago
Model Checking Linear Programs with Arrays
In previous work we proposed Linear Programs as a fine grained model for imperative programs, and showed how the model checking procedure used in SLAM can be generalised to a mode...
Alessandro Armando, Massimo Benerecetti, Jacopo Ma...