Sciweavers

955 search results - page 108 / 191
» Model Checking Operator Procedures
Sort
View
DATE
2004
IEEE
142views Hardware» more  DATE 2004»
14 years 1 months ago
Eliminating False Positives in Crosstalk Noise Analysis
Noise affects circuit operation by increasing gate delays and causing latches to capture incorrect values. Noise analysis techniques can detect some of such noise faults, but accu...
Yajun Ran, Alex Kondratyev, Yosinori Watanabe, Mal...
FORTE
1997
13 years 11 months ago
On-Line Timed Protocol Trace Analysis Based on Uncertain State Descriptions
This paper presents a new approach to the task of passive protocol tracing. The method called FollowSM for the first time meets all requirements of practical in-field use, inclu...
Marek Musial
WFLP
2009
Springer
255views Algorithms» more  WFLP 2009»
14 years 2 months ago
Constraint Based Strategies
Numerous computational and deductive frameworks use the notion of strategy to guide reduction and search space exploration, making the macro scale control of micro operations an ex...
Claude Kirchner, Florent Kirchner, Hél&egra...
CHARME
1999
Springer
100views Hardware» more  CHARME 1999»
14 years 2 months ago
Xs are for Trajectory Evaluation, Booleans are for Theorem Proving
Abstract. This paper describes a semantic connection between the symbolic trajectory evaluation model-checking algorithm and relational verification in higher-order logic. We prov...
Mark Aagaard, Thomas F. Melham, John W. O'Leary
CISC
2007
Springer
117views Cryptology» more  CISC 2007»
14 years 1 months ago
An Efficient ID-Based Proxy Signature Scheme from Pairings
This paper proposes a new ID-based proxy signature scheme based on the bilinear pairings. The number of paring operation involved in the verification procedure of our scheme is onl...
Chunxiang Gu, Yuefei Zhu