Sciweavers

1528 search results - page 80 / 306
» Performance Assertion Checking
Sort
View
ACSAC
2003
IEEE
14 years 2 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
CORR
2006
Springer
100views Education» more  CORR 2006»
13 years 9 months ago
Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels
This paper describes an efficient implementation of binning for decode-and-forward (DF) in relay channels using lowdensity parity-check (LDPC) codes. Bilayer LDPC codes are devised...
Peyman Razaghi, Wei Yu
TSE
2010
123views more  TSE 2010»
13 years 3 months ago
Directed Explicit State-Space Search in the Generation of Counterexamples for Stochastic Model Checking
Current stochastic model checkers do not make counterexamples for property violations readily available. In this paper we apply directed explicit state space search to discrete- a...
Husain Aljazzar, Stefan Leue
ICCD
2005
IEEE
92views Hardware» more  ICCD 2005»
14 years 5 months ago
Mitigating Soft Errors in Highly Associative Cache with CAM-based Tag
Content Addressable Memories (CAM) are widely used for the tag portions in highly associative caches. Since data are not explicitly read out of tag array in CAM search, the detect...
Luong Dinh Hung, Masahiro Goshima, Shuichi Sakai
FM
2001
Springer
96views Formal Methods» more  FM 2001»
14 years 1 months ago
Houdini, an Annotation Assistant for ESC/Java
A static program checker that performs modular checking can check one program module for errors without needing to analyze the entire program. Modular checking requires that each m...
Cormac Flanagan, K. Rustan M. Leino