Sciweavers

1179 search results - page 38 / 236
» Relative Timing Based Verification of Timed Circuits and Sys...
Sort
View
129
Voted
HIPC
2005
Springer
15 years 9 months ago
Preemption Adaptivity in Time-Published Queue-Based Spin Locks
Abstract. The proliferation of multiprocessor servers and multithreaded applications has increased the demand for high-performance synchronization. Traditional scheduler-based lock...
Bijun He, William N. Scherer III, Michael L. Scott
145
Voted
ICISC
2004
147views Cryptology» more  ICISC 2004»
15 years 5 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
135
Voted
ICCAD
1996
IEEE
141views Hardware» more  ICCAD 1996»
15 years 7 months ago
An observability-based code coverage metric for functional simulation
Functional simulation is the most widely used method for design verification. At various levels of abstraction, e.g., behavioral, register-transfer level and gate level, the design...
Srinivas Devadas, Abhijit Ghosh, Kurt Keutzer
153
Voted
TIC
2000
Springer
137views System Software» more  TIC 2000»
15 years 7 months ago
Scalable Certification for Typed Assembly Language
Abstract. A type-based certifying compiler maps source code to machine code and target-level type annotations. The target-level annotations make it possible to prove easily that th...
Dan Grossman, J. Gregory Morrisett
159
Voted
ICSE
1999
IEEE-ACM
15 years 7 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith