Sciweavers

1219 search results - page 15 / 244
» Verification of Equivalent-Results Methods
Sort
View
VLSID
2002
IEEE
149views VLSI» more  VLSID 2002»
14 years 7 months ago
Development of ASIC Chip-Set for High-End Network Processing Application-A Case Study
Choosing the right methodology is a significant step towards successful VLSI designs. Traditional methodologies and tools are no longer adequate to handle large and complex design...
Sanjeev Patel
DAC
2005
ACM
13 years 9 months ago
Smart diagnostics for configurable processor verification
This paper describes a novel technique called Embedded Test-bench Control (ETC), extensively used in the verification of Tensilica’s latest configurable processor. Conventional ...
Sadik Ezer, Scott Johnson
WETICE
2005
IEEE
14 years 1 months ago
Application of Lightweight Formal Methods to Software Security
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines...
David P. Gilliam, John D. Powell, Matt Bishop
ICDAR
2005
IEEE
14 years 1 months ago
A Study on Vulnerability in On-line Writer Verification System
The analysis of vulnerabilities and threats in biometrics-based personal authentication systems is indispensable for the development and promotion of wide spread utilization of bi...
Yasushi Yamazaki, Akane Nakashima, Kazunobu Tasaka...
ICFEM
2009
Springer
13 years 5 months ago
The VSE Refinement Method in Hets
We present the integration of refinement method of VSE verification tool, successfully used in industrial applications, in the Heterogeneous Tool Set HETS. The connection is done v...
Mihai Codescu, Bruno Langenstein, Christian Maeder...