Sciweavers

38 search results - page 4 / 8
» cav 2008
Sort
View
CAV
2008
Springer
152views Hardware» more  CAV 2008»
13 years 9 months ago
Heap Assumptions on Demand
Termination of a heap-manipulating program generally depends on preconditions that express heap assumptions (i.e., assertions describing reachability, aliasing, separation and shar...
Andreas Podelski, Andrey Rybalchenko, Thomas Wies
CAV
2008
Springer
80views Hardware» more  CAV 2008»
13 years 9 months ago
Ranking Automata and Games for Prioritized Requirements
Requirements of reactive systems are usually specified by classifying system executions as desirable and undesirable. To specify prioritized requirements, we propose to associate a...
Rajeev Alur, Aditya Kanade, Gera Weiss
CAV
2008
Springer
115views Hardware» more  CAV 2008»
13 years 9 months ago
An Algebraic Approach for Proving Data Correctness in Arithmetic Data Paths
This paper proposes a new approach for proving arithmetic correctness of data paths in System-on-Chip modules. It complements existing techniques which are, for reasons of complexi...
Oliver Wienand, Markus Wedler, Dominik Stoffel, Wo...
CAV
2008
Springer
125views Hardware» more  CAV 2008»
13 years 9 months ago
A Practical Approach to Word Level Model Checking of Industrial Netlists
In this paper we present a word-level model checking method that attempts to speed up safety property checking of industrial netlists. Our aim is to construct an algorithm that all...
Per Bjesse
CAV
2008
Springer
161views Hardware» more  CAV 2008»
13 years 9 months ago
Constraint-Based Approach for Analysis of Hybrid Systems
Abstract. This paper presents a constraint-based technique for discovering a rich class of inductive invariants (boolean combinations of polynomial inequalities of bounded degree) ...
Sumit Gulwani, Ashish Tiwari