Sciweavers

289 search results - page 45 / 58
» Verification Patterns for Rapid Embedded System Verification
Sort
View
133
Voted
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
15 years 10 days ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
109
Voted
ATVA
2010
Springer
125views Hardware» more  ATVA 2010»
15 years 3 months ago
Using Redundant Constraints for Refinement
Abstract. This paper is concerned with a method for computing reachable sets of linear continuous systems with uncertain input. Such a method is required for verification of hybrid...
Eugene Asarin, Thao Dang, Oded Maler, Romain Testy...
120
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Interval quality: relating customer-perceived quality to process quality
We investigate relationships among software quality measures commonly used to assess the value of a technology, and several aspects of customer perceived quality measured by Inter...
Audris Mockus, David M. Weiss
128
Voted
FMAM
2010
157views Formal Methods» more  FMAM 2010»
15 years 18 days ago
An Experience on Formal Analysis of a High-Level Graphical SOA Design
: In this paper, we present the experience gained with the participation in a case study in which a novel high-level design language (UML4SOA) was used to produce a service-oriente...
Maurice H. ter Beek, Franco Mazzanti, Aldi Sulova
153
Voted
INFOCOM
2010
IEEE
15 years 15 days ago
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming
Network coding has been shown to be capable of greatly improving quality of service in P2P live streaming systems (e.g., IPTV). However, network coding is vulnerable to pollution a...
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khu...