Sciweavers

32 search results - page 6 / 7
» Verification of K-step opacity and analysis of its complexit...
Sort
View
DAC
2009
ACM
14 years 7 months ago
Interconnection fabric design for tracing signals in post-silicon validation
Post-silicon validation has become an essential step in the design flow of today's complex integrated circuits. One effective technique that provides real-time visibility to ...
Xiao Liu, Qiang Xu
GLVLSI
2003
IEEE
153views VLSI» more  GLVLSI 2003»
13 years 12 months ago
FORCE: a fast and easy-to-implement variable-ordering heuristic
The MINCE heuristic for variable-ordering [1] successfully reduces the size of BDDs and can accelerate SAT-solving. Applications to reachability analysis have also been successful...
Fadi A. Aloul, Igor L. Markov, Karem A. Sakallah
SIGSOFT
2008
ACM
14 years 7 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
AES
2008
Springer
97views Cryptology» more  AES 2008»
13 years 6 months ago
Software mechanisms for extensible and scalable 3D visualization of construction operations
This paper presents research that led to the design and implementation of an extensible and scalable software framework for the dynamic 3D visualization of simulated construction ...
Vineet R. Kamat, Julio C. Martínez
CI
2000
114views more  CI 2000»
13 years 6 months ago
A Guided Tour through Some Extensions of the Event Calculus
Kowalski and Sergot's Event Calculus (EC) is a simple temporal formalism that, given a set of event occurrences, derives the maximal validity intervals (MVIs) over which prop...
Iliano Cervesato, Massimo Franceschet, Angelo Mont...