Sciweavers

1528 search results - page 28 / 306
» Performance Assertion Checking
Sort
View
CSE
2009
IEEE
14 years 3 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
ICCD
1995
IEEE
109views Hardware» more  ICCD 1995»
14 years 10 days ago
Verifying the performance of the PCI local bus using symbolic techniques
Symbolic model checking is a successful technique for checking properties of large finite-state systems. This method has been used to verify a number of real-world hardware desig...
Sérgio Vale Aguiar Campos, Edmund M. Clarke...
DATE
2008
IEEE
75views Hardware» more  DATE 2008»
14 years 3 months ago
A low-cost concurrent error detection technique for processor control logic
This paper presents a concurrent error detection technique targeted towards control logic in a processor with emphasis on low area overhead. Rather than detect all modeled transie...
Ramtilak Vemu, Abhijit Jas, Jacob A. Abraham, Srin...
IROS
2007
IEEE
87views Robotics» more  IROS 2007»
14 years 3 months ago
Vision-based loop closing for delayed state robot mapping
— This paper shows results on outdoor vision-based loop closing for Simultaneous Localization and Mapping. Our experiments show that for loops of over 50m, the pose estimates mai...
Viorela Ila, Juan Andrade-Cetto, Rafael Valencia, ...
TACAS
2004
Springer
135views Algorithms» more  TACAS 2004»
14 years 2 months ago
Liveness with Incomprehensible Ranking
Abstract. The methods of Invisible Invariants and Invisible Ranking were developed originally in order to verify temporal properties of parameterized systems in a fully automatic m...
Yi Fang, Nir Piterman, Amir Pnueli, Lenore D. Zuck