Sciweavers

916 search results - page 58 / 184
» Using redundancies to find errors
Sort
View
CADE
1992
Springer
14 years 3 months ago
Caching and Lemmaizing in Model Elimination Theorem Provers
Theorem provers based on model elimination have exhibited extremely high inference rates but have lacked a redundancy control mechanism such as subsumption. In this paper we repor...
Owen L. Astrachan, Mark E. Stickel
DISCEX
2003
IEEE
14 years 4 months ago
Willow System Demonstration
Dealing with damage that arises during operation of networked information systems is essential if such systems are to provide the dependability required by modern critical applica...
John C. Knight, Jonathan Hill, Philip E. Varner, P...
MM
1995
ACM
100views Multimedia» more  MM 1995»
14 years 2 months ago
Fast Lossy Internet Image Transmission
Images are usually transmitted across the Internet using a lossless protocol such as TCP/IP. Lossless protocols require retransmission of lost packets, which substantially increas...
John M. Danskin, Geoffrey M. Davis, Xiyong Song
FUIN
2000
68views more  FUIN 2000»
13 years 11 months ago
Models For Dependable Computation with Multiple Inputs and Some Hardness Results
We consider the problem of dependable computation with multiple inputs. The goal is to study when redundancy can help to achieve survivability and when it cannot. We use AND/OR gra...
Yongge Wang, Yvo Desmedt, Mike Burmester
ISCA
2007
IEEE
130views Hardware» more  ISCA 2007»
14 years 5 months ago
Dynamic prediction of architectural vulnerability from microarchitectural state
Transient faults due to particle strikes are a key challenge in microprocessor design. Driven by exponentially increasing transistor counts, per-chip faults are a growing burden. ...
Kristen R. Walcott, Greg Humphreys, Sudhanva Gurum...