Sciweavers

CAV
2006
Springer
117views Hardware» more  CAV 2006»
14 years 12 days ago
Using Statically Computed Invariants Inside the Predicate Abstraction and Refinement Loop
e Abstraction and Refinement Loop Himanshu Jain1,2, Franjo Ivanci
Himanshu Jain, Franjo Ivancic, Aarti Gupta, Ilya S...
DATE
2004
IEEE
114views Hardware» more  DATE 2004»
14 years 12 days ago
Workload Characterization Model for Tasks with Variable Execution Demand
The analysis of real-time properties of an embedded system usually relies on the worst-case execution times (WCET) of the tasks to be executed. In contrast to that, in real world ...
Alexander Maxiaguine, Simon Künzli, Lothar Th...
CAV
2006
Springer
95views Hardware» more  CAV 2006»
14 years 12 days ago
Yasm: A Software Model-Checker for Verification and Refutation
Example Guided Abstraction Refinement (CEGAR) [6] framework. A number of wellengineered software model-checkers are available, e.g., SLAM [1] and BLAST [12]. Why build another one?...
Arie Gurfinkel, Ou Wei, Marsha Chechik
DATE
2004
IEEE
118views Hardware» more  DATE 2004»
14 years 12 days ago
Distributed Multimedia System Design: A Holistic Perspective
Multimedia systems play a central part in many human activities. Due to the significant advances in the VLSI technology, there is an increasing demand for portable multimedia appl...
Radu Marculescu, Massoud Pedram, Jörg Henkel
CAV
2006
Springer
122views Hardware» more  CAV 2006»
14 years 12 days ago
Repair of Boolean Programs with an Application to C
We show how to find and fix faults in Boolean programs by extending the program to a game. In the game, the protagonist can select an alternative implementation for an incorrect st...
Andreas Griesmayer, Roderick Bloem, Byron Cook
DATE
2004
IEEE
184views Hardware» more  DATE 2004»
14 years 12 days ago
Automatic Verification of Safety and Liveness for XScale-Like Processor Models Using WEB Refinements
We show how to automatically verify that complex XScale-like pipelined machine models satisfy the same safety and liveness properties as their corresponding instruction set archit...
Panagiotis Manolios, Sudarshan K. Srinivasan
CAV
2006
Springer
91views Hardware» more  CAV 2006»
14 years 12 days ago
Lookahead Widening
We present lookahead widening, a novel technique for using existing widening and narrowing operators to improve the precision of static analysis. This technique is both self-contai...
Denis Gopan, Thomas W. Reps
DATE
2004
IEEE
120views Hardware» more  DATE 2004»
14 years 12 days ago
Pattern Selection for Testing of Deep Sub-Micron Timing Defects
Due to process variations in deep sub-micron (DSM) technologies, the effects of timing defects are difficult to capture. This paper presents a novel coverage metric for estimating...
Mango Chia-Tso Chao, Li-C. Wang, Kwang-Ting Cheng
CAV
2006
Springer
121views Hardware» more  CAV 2006»
14 years 12 days ago
Deriving Small Unsatisfiable Cores with Dominators
Abstract. The problem of finding a small unsatisfiable core of an unsatisfiable CNF formula is addressed. The proposed algorithm, Trimmer, iterates over each internal node d in the...
Roman Gershman, Maya Koifman, Ofer Strichman