Sciweavers

1818 search results - page 148 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
121
Voted
CAV
2009
Springer
165views Hardware» more  CAV 2009»
15 years 7 months ago
Equivalence Checking of Static Affine Programs Using Widening to Handle Recurrences
Designers often apply manual or semi-automatic loop and data transformations on array and loop intensive programs to improve performance. The transformations should preserve the fu...
Sven Verdoolaege, Gerda Janssens, Maurice Bruynoog...
CSE
2009
IEEE
15 years 7 months ago
Efficient Broadcast on Area of Interest in Voronoi Overlays
This paper presents an algorithm to perform the broadcasting of a packet to all the peers that are located into a convex region (Area of Interest) in a Voronoi based peer-topeer ne...
Michele Albano, Ranieri Baraglia, Matteo Mordacchi...
126
Voted
ITP
2010
155views Mathematics» more  ITP 2010»
15 years 7 months ago
A Trustworthy Monadic Formalization of the ARMv7 Instruction Set Architecture
Abstract. This paper presents a new HOL4 formalization of the current ARM instruction set architecture, ARMv7. This is a modern RISC architecture with many advanced features. The f...
Anthony C. J. Fox, Magnus O. Myreen
136
Voted
FMICS
2009
Springer
15 years 7 months ago
A Certified Implementation on Top of the Java Virtual Machine
Abstract. Safe is a first-order functional language with unusual memory management features: memory can be both explicitly and implicitly deallocated at some specific points in the...
Javier de Dios, Ricardo Peña-Marí
131
Voted
AHS
2006
IEEE
188views Hardware» more  AHS 2006»
15 years 7 months ago
Finite State Machine IP Watermarking: A Tutorial
Sharing Intellectual Property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...