We study the problem of formally verifying shared memory multiprocessor executions against memory consistency models--an important step during post-silicon verification of multipro...
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
gn problem can be abstractly characterized as a constrained function-to-structure mapping. The de sign task takes as input the specifications of the desired functions of a device...
In this paper we propose a locally adaptive image threshold technique via variational energy minimization. The novelty of the proposed method is that from an image it automaticall...
In the framework of computer-aided diagnosis, this paper proposes a novel functionality for computerized tomography (CT)based investigation of pulmonary airways. It provides a spe...