Sciweavers

1821 search results - page 348 / 365
» Security-Aware Program Transformations
Sort
View
109
Voted
DAC
2002
ACM
16 years 3 months ago
Dynamic hardware plugins in an FPGA with partial run-time reconfiguration
Tools and a design methodology have been developed to support partial run-time reconfiguration of FPGA logic on the Field Programmable Port Extender. High-speed Internet packet pr...
Edson L. Horta, John W. Lockwood, David E. Taylor,...
146
Voted
DAC
2005
ACM
16 years 3 months ago
StressTest: an automatic approach to test generation via activity monitors
The challenge of verifying a modern microprocessor design is an overwhelming one: Increasingly complex micro-architectures combined with heavy time-to-market pressure have forced ...
Ilya Wagner, Valeria Bertacco, Todd M. Austin
132
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Data flow testing of service-oriented workflow applications
WS-BPEL applications are a kind of service-oriented application. They use XPath extensively to integrate loosely-coupled workflow steps. However, XPath may extract wrong data from...
Lijun Mei, W. K. Chan, T. H. Tse
125
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
A verification system for timed interval calculus
Timed Interval Calculus (TIC) is a highly expressive set-based notation for specifying and reasoning about embedded real-time systems. However, it lacks mechanical proving support...
Chunqing Chen, Jin Song Dong, Jun Sun 0001
132
Voted
ISBI
2008
IEEE
16 years 2 months ago
Multiresolution identification of germ layer components in teratomas derived from human and nonhuman primate embryonic stem cell
We propose a system for identification of germ layer components in teratomas derived from human and nonhuman primate embryonic stem cells. Tissue regeneration and repair, drug tes...
Amina Chebira, John A. Ozolek, Carlos A. Castro, W...