Sciweavers

2513 search results - page 179 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
FORTE
2008
15 years 6 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
JAIR
2008
123views more  JAIR 2008»
15 years 4 months ago
CTL Model Update for System Modifications
Model checking is a promising technology, which has been applied for verification of many hardware and software systems. In this paper, we introduce the concept of model update to...
Yan Zhang, Yulin Ding
JMLR
2007
137views more  JMLR 2007»
15 years 4 months ago
Building Blocks for Variational Bayesian Learning of Latent Variable Models
We introduce standardised building blocks designed to be used with variational Bayesian learning. The blocks include Gaussian variables, summation, multiplication, nonlinearity, a...
Tapani Raiko, Harri Valpola, Markus Harva, Juha Ka...
ICIP
1999
IEEE
15 years 9 months ago
Forward Adaptive Modeling for Context-Based Compression of Large Binary Images in Applications Requiring Spatial Access
A method for compression of large binary images is proposed for applications where spatial access to the image is required. The proposed method is a two-stage combination of forwa...
Eugene I. Ageenko, Pasi Fränti
IESS
2009
Springer
182views Hardware» more  IESS 2009»
15 years 2 months ago
Modeling Cache Effects at the Transaction Level
Abstract. Embedded system design complexities are growing exponentially. Demand has increased for modeling techniques that can provide both accurate measurements of delay and fast ...
Ardavan Pedram, David Craven, Andreas Gerstlauer