咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 5 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 6 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 3 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
  • 1 篇 哲学
  • 1 篇 理学
    • 1 篇 数学

主题

  • 11 篇 verification com...
  • 2 篇 congested clique
  • 2 篇 opacity
  • 2 篇 markov processes
  • 2 篇 proof-labeling s...
  • 2 篇 automata
  • 2 篇 discrete event s...
  • 2 篇 congest model
  • 1 篇 de morgan canoni...
  • 1 篇 algorithm specif...
  • 1 篇 parallel process...
  • 1 篇 parallel archite...
  • 1 篇 thread migration
  • 1 篇 computational co...
  • 1 篇 safe-critical sy...
  • 1 篇 NOT FOUND
  • 1 篇 distributed cach...
  • 1 篇 binary moment di...
  • 1 篇 chip multiproces...
  • 1 篇 software archite...

机构

  • 1 篇 dfki gmbh cyber ...
  • 1 篇 tel aviv univ sc...
  • 1 篇 univ british col...
  • 1 篇 guizhou univ sta...
  • 1 篇 mit elect engn &...
  • 1 篇 univ illinois co...
  • 1 篇 intentionet seat...
  • 1 篇 univ connecticut...
  • 1 篇 univ bremen inst...
  • 1 篇 univ cyprus dept...
  • 1 篇 graz univ techno...
  • 1 篇 tel aviv univ sc...
  • 1 篇 cent univ financ...
  • 1 篇 school of inform...
  • 1 篇 univ cyprus dept...
  • 1 篇 ucla ca 90024 us...
  • 1 篇 de shaw res ny 1...
  • 1 篇 guizhou univ sta...
  • 1 篇 acad coll tel av...
  • 1 篇 microsoft redmon...

作者

  • 2 篇 patt-shamir boaz
  • 2 篇 perry mor
  • 2 篇 saboori anooshir...
  • 2 篇 hadjicostis chri...
  • 1 篇 zhang duo
  • 1 篇 ma jianfeng
  • 1 篇 dongchen jiang
  • 1 篇 kim taeho
  • 1 篇 kakarla siva kes...
  • 1 篇 miao zhou
  • 1 篇 barhoush mohamme...
  • 1 篇 rosenmann amnon
  • 1 篇 shim keun sup
  • 1 篇 varghese george
  • 1 篇 park jeman
  • 1 篇 tian youliang
  • 1 篇 beckett ryan
  • 1 篇 khan omer
  • 1 篇 devadas srinivas
  • 1 篇 mahzoon alireza

语言

  • 10 篇 英文
  • 1 篇 其他
检索条件"主题词=verification complexity"
11 条 记 录,以下是1-10 订阅
排序:
Current-State Opacity Formulations in Probabilistic Finite Automata
收藏 引用
IEEE TRANSACTIONS ON AUTOMATIC CONTROL 2014年 第1期59卷 120-133页
作者: Saboori, Anooshiravan Hadjicostis, Christoforos N. Univ Illinois Coordinated Sci Lab Dept Elect & Comp Engn Urbana IL 61801 USA Univ Cyprus Dept Elect & Comp Engn CY-1678 Nicosia Cyprus
A system is said to be current-state opaque if the entrance of the system state to a set of secret states remains opaque (uncertain) to an intruder-at least until the system leaves the set of secret states. This notio... 详细信息
来源: 评论
Proof-labeling schemes: Broadcast, unicast and in between
收藏 引用
THEORETICAL COMPUTER SCIENCE 2022年 923卷 179-195页
作者: Patt-Shamir, Boaz Perry, Mor Tel Aviv Univ Sch Elect Engn Tel Aviv Israel Acad Coll Tel Aviv Yaffo Sch Comp Sci Tel Aviv Israel
We study the effect of limiting the number of different messages a node can transmit simultaneously on the verification complexity of proof-labeling schemes (PLS). In a PLS, each node is given a label, and the goal is... 详细信息
来源: 评论
A multiple-valued logic approach to the design and verification of hardware circuits
收藏 引用
JOURNAL OF APPLIED LOGIC 2016年 15卷 69-93页
作者: Rosenmann, Amnon Graz Univ Technol Inst Discrete Math Steyrergasse 30 A-8010 Graz Austria
We present a novel approach, which is based on multiple-valued logic (MVL), to the verification and analysis of digital hardware designs, which extends the common ternary or quaternary approaches for simulations. The ... 详细信息
来源: 评论
Current-State Opacity Formulations in Probabilistic Finite Automata (vol 59, pg 120, 2014)
收藏 引用
IEEE TRANSACTIONS ON AUTOMATIC CONTROL 2024年 第5期69卷 3480-3481页
作者: Saboori, Anooshiravan Hadjicostis, Christoforos N. Snowflake Inc San Mateo CA 94402 USA Univ Cyprus Dept ECE CY-1678 Nicosia Cyprus
This note identifies a flaw in the proof of Theorem 16 in (Saboori and Hadjicostis, 2014). It also discusses how the statement of Theorem 16 can be adjusted and provides the corresponding proof.
来源: 评论
The Execution Migration Machine: Directoryless Shared-Memory Architecture
收藏 引用
COMPUTER 2015年 第9期48卷 50-59页
作者: Shim, Keun Sup Lis, Mieszko Khan, Omer Devadas, Srinivas DE Shaw Res New York NY 10036 USA Univ British Columbia Dept Elect & Comp Engn Vancouver BC V5Z 1M9 Canada Univ Connecticut Dept Elect & Comp Engn Storrs CT USA MIT Elect Engn & Comp Sci Cambridge MA 02139 USA
For certain applications involving chip multiprocessors with more than 16 cores, a directoryless architecture with fine-grained and partial-context thread migration can outperform directory-based coherence, providing ... 详细信息
来源: 评论
A Comparative Study of Insertion Sorting Algorithm verification  2
A Comparative Study of Insertion Sorting Algorithm Verificat...
收藏 引用
2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC 2017)
作者: Dongchen Jiang Miao Zhou School of Information Science & Technology Beijing Forestry University
Focusing on the impact different ways of formalization have on the according verifications of sorting algorithm,this paper presents the formal specifications of insertion sort,and verifies its functional correctness u... 详细信息
来源: 评论
A Method of Logically Time Synchronization for Safety-critical Distributed System  18
A Method of Logically Time Synchronization for Safety-critic...
收藏 引用
18th International Conference on Advanced Communication Technology (ICACT)
作者: Park, Jeman Kim, Taeho Elect & Telecommun Res Inst Daejeon South Korea
Legacy real-time and embedded systems have been small scale and standalone. However, recently they are increasingly being connected to create large-scale distributed system. Such distributed embedded system is realize... 详细信息
来源: 评论
Polynomial Word-Level verification of Arithmetic Circuits  21
Polynomial Word-Level Verification of Arithmetic Circuits
收藏 引用
19th ACM-IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE)
作者: Barhoush, Mohammed Mahzoon, Alireza Drechsler, Rolf Univ Bremen Inst Comp Sci Bremen Germany DFKI GmbH Cyber Phys Syst Bremen Germany
Verifying the functional correctness of a circuit is often the most time-consuming part of the design process. Recently, world-level formal verification methods, e.g., Binary Moment Diagram (BMD) and Symbolic Computer... 详细信息
来源: 评论
Proof-Labeling Schemes: Broadcast, Unicast and in Between  1
收藏 引用
19th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)
作者: Patt-Shamir, Boaz Perry, Mor Tel Aviv Univ Sch Elect Engn IL-6997801 Tel Aviv Israel
We study the effect of limiting the number of different messages a node can transmit simultaneously on the verification complexity of proof-labeling schemes (PLS). In a PLS, each node is given a label, and the goal is... 详细信息
来源: 评论
Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators
Cooperative Game Model of Delegation Computing: Verifier Sep...
收藏 引用
39th IEEE International Conference on Computer Communications (IEEE INFOCOM)
作者: Zhang, Duo Tian, Youliang Wang, Linjie Gao, Sheng Ma, Jianfeng Guizhou Univ State Key Lab Publ Big Data Coll Comp Sci & Technol Coll Math & Stat Guiyang Peoples R China Guizhou Univ State Key Lab Publ Big Data Coll Comp Sci & Technol Inst Cryptog & Date Secur Guiyang Peoples R China Guizhou Univ State Key Lab Publ Big Data Coll Comp Sci & Technol Guiyang Peoples R China Cent Univ Finance & Econ Sch Informat Beijing Peoples R China Xidian Univ Sch Cyber Engn Coll Comp Sci & Technol Xian Peoples R China
In cloud computing, the delegation computation service is required because end users usually are resource constrained, and at the same time the correctness of computing results needs to be verified. However, all the e... 详细信息
来源: 评论