Sciweavers

1633 search results - page 199 / 327
» On the Verification of Temporal Properties
Sort
View
DAC
2009
ACM
14 years 5 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
GPCE
2007
Springer
14 years 4 months ago
Safe composition of product lines
Programs of a software product line can be synthesized by composing modules that implement features. Besides high-level domain constraints that govern the compatibility of feature...
Sahil Thaker, Don S. Batory, David Kitchin, Willia...
SAFECOMP
2007
Springer
14 years 4 months ago
Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System
A strategy and relating activities of a software safety analysis (SSA) are presented for the software of a digital reactor protection system where software modules in the design de...
Gee-Yong Park, Jang-Soo Lee, Se Woo Cheon, Kee-Cho...
SIGSOFT
1996
ACM
14 years 2 months ago
Abstracting Dependencies between Software Configuration Items
ing Dependencies between Software Configuration Items CARL A. GUNTER University of Pennsylvania icle studies an abstract model of dependencies between software configuration items ...
Carl A. Gunter
ASPDAC
2007
ACM
82views Hardware» more  ASPDAC 2007»
14 years 2 months ago
Efficient BMC for Multi-Clock Systems with Clocked Specifications
- Current industry trends in system design -- multiple clocks, clocks with arbitrary frequency ratios, multi-phased clocks, gated clocks, and level-sensitive latches, combined with...
Malay K. Ganai, Aarti Gupta