Sciweavers

ISCA
2010
IEEE
222views Hardware» more  ISCA 2010»
13 years 10 months ago
Cohesion: a hybrid memory model for accelerators
Two broad classes of memory models are available today: models with hardware cache coherence, used in conventional chip multiprocessors, and models that rely upon software to mana...
John H. Kelm, Daniel R. Johnson, William Tuohy, St...
ISARCS
2010
240views Hardware» more  ISARCS 2010»
13 years 10 months ago
Engineering a Distributed e-Voting System Architecture: Meeting Critical Requirements
Voting is a critical component of any democratic process; and electronic voting systems should be developed following best practices for critical system development. E-voting has i...
J. Paul Gibson, Eric Lallet, Jean-Luc Raffy
ISARCS
2010
164views Hardware» more  ISARCS 2010»
13 years 10 months ago
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays
Abstract. Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are in...
Daniel Germanus, Abdelmajid Khelil, Neeraj Suri
CAV
2008
Springer
89views Hardware» more  CAV 2008»
13 years 10 months ago
Inferring Congruence Equations Using SAT
This paper proposes a new approach for deriving invariants that are systems of congruence equations where the modulo is a power of 2. The technique is an amalgam of SAT-solving, wh...
Andy King, Harald Søndergaard
CAV
2008
Springer
139views Hardware» more  CAV 2008»
13 years 10 months ago
CSIsat: Interpolation for LA+EUF
We present CSIsat, an interpolating decision procedure for the quantifier-free theory of rational linear arithmetic and equality with uninterpreted function symbols. Our implementa...
Dirk Beyer, Damien Zufferey, Rupak Majumdar
CAV
2008
Springer
80views Hardware» more  CAV 2008»
13 years 10 months ago
Ranking Automata and Games for Prioritized Requirements
Requirements of reactive systems are usually specified by classifying system executions as desirable and undesirable. To specify prioritized requirements, we propose to associate a...
Rajeev Alur, Aditya Kanade, Gera Weiss
CAV
2008
Springer
99views Hardware» more  CAV 2008»
13 years 10 months ago
Correcting a Space-Efficient Simulation Algorithm
Although there are many efficient algorithms for calculating the simulation preorder on finite Kripke structures, only two have been proposed of which the space complexity is of t...
Rob J. van Glabbeek, Bas Ploeger
CAV
2008
Springer
104views Hardware» more  CAV 2008»
13 years 10 months ago
Proving Conditional Termination
Abstract. We describe a method for synthesizing reasonable underapproximations to weakest preconditions for termination--a long-standing open problem. The paper provides experiment...
Byron Cook, Sumit Gulwani, Tal Lev-Ami, Andrey Ryb...
CAV
2008
Springer
112views Hardware» more  CAV 2008»
13 years 10 months ago
Automated Assume-Guarantee Reasoning by Abstraction Refinement
Mihaela Gheorghiu Bobaru, Corina S. Pasareanu, Dim...
CAV
2008
Springer
104views Hardware» more  CAV 2008»
13 years 10 months ago
Semi-external LTL Model Checking
Stefan Edelkamp, Peter Sanders, Pavel Simecek