14,246 Hits in 3.5 sec

Validating direct memory access interfaces with conformance checking

Li Lei, Kai Cong, Zhenkun Yang, Fei Xie
2014 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)  
tions, our extended conformance checking further 1) Symbolic execution: Conformance checking utilizes validates interface registers related to the DMA in- symbolic execution [13]  ...  of time and memory usages in the runtime recording stage of the conformance checking work flow.  ... 
doi:10.1109/iccad.2014.7001323 dblp:conf/iccad/LeiCYX14 fatcat:eibk6ryronc7xe5l4d2aa37zii

An Efficient and Effective Framework to Track, Monitor, and Orchestrate Resource Usage in an Infrastructure as a Service

2019 International journal of recent technology and engineering  
A key test supporting these issues is the persistent following and checking of asset utilization in the framework.  ...  This paper, we will in general present ATOM, a proficient and compelling structure to naturally follow, screen, and coordinate asset use in a framework which is generally utilized in cloud foundation.  ...  An Efficient and Effective Framework to Track, Monitor, and Orchestrate Resource Usage in an Infrastructure as a Service get-at-able trade for ability assaults.  ... 
doi:10.35940/ijrte.c5690.098319 fatcat:bbzvbkw6ebdalj7cjoxyt4fpqi

Adaptive Online Program Analysis

Matthew B. Dwyer, Alex Kinneer, Sebastian Elbaum
2007 Proceedings / International Conference of Software Engineering  
In this paper, we present an approach for exploiting properties of stateful program specifications to reduce the cost of their dynamic analysis.  ...  We describe the principles behind our adaptive online program analysis technique, extensions to our Java run-time analysis framework that support such analyses, and report on the performance and capabilities  ...  We believe that there are a wealth of research opportunities to be explored with adaptive online program analysis, such as making a wider variety of analyses adaptive, studying the cost and effectiveness  ... 
doi:10.1109/icse.2007.12 dblp:conf/icse/DwyerKE07 fatcat:3mbircprg5buxn2b34sa7ygndu

Hardware/Software Co-monitoring [article]

Li Lei, Kai Cong, Zhenkun Yang, Bo Chen, Fei Xie
2019 arXiv   pre-print
Our approach utilizes a formal device model (FDM), a transaction-level model derived from the device specification, to shadow the real device execution.  ...  Based on the co-execution of the device and FDM, HW/SW co-monitoring carries out two-tier runtime checking: (1) device checking checks if the device behaviors conform to the FDM behaviors; (2) property  ...  SEE employs a technique, conformance checking, which is originally applied to check the conformance between a device and its virtual prototype in previous work.  ... 
arXiv:1905.03915v1 fatcat:auadrvububhmzdp5ttqykcdgau

DeSyRe: On-demand system reliability

I. Sourdis, C. Strydis, A. Armato, C.S. Bouganis, B. Falsafi, G.N. Gaydadjiev, S. Isaza, A. Malek, R. Mariani, D. Pnevmatikatos, D.K. Pradhan, G. Rauwerda (+6 others)
2013 Microprocessors and microsystems  
In the face of such changes in the technological landscape, current solutions for fault tolerance are expected to introduce excessive overheads in future systems.  ...  To make matters worse, power density is becoming a significant limiting factor in SoC design, in general.  ...  In the following, online testing support architectures for Xentium DSP component, which is a crucial component in DeSyRe framework, is discussed in greater detail.  ... 
doi:10.1016/j.micpro.2013.08.008 fatcat:jg623r4hmngthk652u7qi6ibme

Enabling Proactive Adaptation through Just-in-Time Testing of Conversational Services [chapter]

Dimitris Dranidis, Andreas Metzger, Dimitrios Kourtesis
2010 Lecture Notes in Computer Science  
The approach is based on a framework for online testing and a formal test-generation method which guarantees functional correctness for conversational services.  ...  Reacting to failures of those third-party services by dynamically adapting the SBAs will become a key enabler for ensuring reliability.  ...  For further information please visit  ... 
doi:10.1007/978-3-642-17694-4_6 fatcat:odntp23w5fd5zeamhhyslenlv4

Online conformance checking: relating event streams to process models using prefix-alignments

Sebastiaan J. van Zelst, Alfredo Bolt, Marwan Hassani, Boudewijn F. van Dongen, Wil M. P. van der Aalst
2017 International Journal of Data Science and Analytics  
In this paper, we present a novel approach to incrementally compute prefix-alignments, paving the way for real-time online conformance checking.  ...  Hence, we need techniques that enable us to perform conformance checking in an online setting.  ...  any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s41060-017-0078-6 dblp:journals/ijdsa/ZelstBHDA19 fatcat:23xvabwzmfheddmiwnxh3mjr5e

Coverage evaluation of post-silicon validation tests with virtual prototypes

Kai Cong, Li Lei, Zhenkun Yang, Fei Xie
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014  
To ensure fidelity of early coverage evaluation, our approach have been further extended to support coverage evaluation and conformance checking in the post-silicon stage.  ...  High-quality tests for post-silicon validation should be ready before a silicon device becomes available in order to save time spent on preparing, debugging and fixing tests after the device is available  ...  A pending patent filed on this research by Portland State University has been licensed to Virtual Device Technologies (VDTech) where Fei Xie is a partner.  ... 
doi:10.7873/date.2014.331 dblp:conf/date/CongLYX14 fatcat:jxwwmmt6ujdvbhpi5tdjehsxky

2020 Index IEEE Transactions on Knowledge and Data Engineering Vol. 32

2021 IEEE Transactions on Knowledge and Data Engineering  
., +, TKDE July 2020 1419-1430 Conformance testing Efficient Process Conformance Checking on the Basis of Uncertain Event-to-Activity Mappings. van der Aa, H., +, TKDE May 2020 927-940 Constraint handling  ...  ., +, TKDE July 2020 1362-1377 Skia: Scalable and Efficient In-Memory Analytics for Big Spatial-Textual Data.  ... 
doi:10.1109/tkde.2020.3038549 fatcat:75f5fmdrpjcwrasjylewyivtmu

Multiclass Membership Determination Integrating an ID-Bound Method with Bloom Filter

Lu-I Chen, Heng Ma
2020 Information Technology and Control  
We depict specific characteristics for tackling the problem, including simplicity of data structure for encoding the members, avoidance of checking all classification IDs in the lookup process, and adoption  ...  Experimental results show that the error ratios were competitive and consistent with different levels of classification, as well as the memory space utilized.  ...  However, in Figure 7 , it shows that lookup efficiency improves as the memory-space utilization increases for our approach, while that of the benchmark lacks such a tendency.  ... 
doi:10.5755/j01.itc.49.2.24633 fatcat:tjuzw4yve5crpfttbrem6wkhie

Automated Multi-Architectural Discovery of CFI-Resistant Code Gadgets [article]

Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz
2020 arXiv   pre-print
To ease the assessment of a given CFI implementation, we introduce a framework to discover code gadgets for code-reuse attacks that conform to coarse-grained CFI policies.  ...  Memory corruption vulnerabilities are still a severe threat for software systems. To thwart the exploitation of such vulnerabilities, many different kinds of defenses have been proposed in the past.  ...  To check for gadgets in the future control flow, ROPecker combines online emulation of the flow, stack inspection, and an offline gadget search.  ... 
arXiv:2007.04116v1 fatcat:brr6vqa74jhzjjue2yo6sacoyy

2020 Index IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems Vol. 39

2020 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
Coskun, A., +, TCAD Dec. 2020 5183-5196 Eva-CiM: A System-Level Performance and Energy Evaluation Framework for Computing-in-Memory Architectures.  ...  ., +, TCAD Aug. 2020 1744-1749 Integrated optics A Cross-Layer Optimization Framework for Integrated Optical Switches in Parity check codes Error Diluting: Exploiting 3-D nand Flash Process Variation for  ...  Entropy-Directed Scheduling for FPGA High-Level Synthesis. Shen, M., +, TCAD Oct. 2020 2588 -2601 FLASH: Fast, Parallel, and Accurate Simulator for HLS.  ... 
doi:10.1109/tcad.2021.3054536 fatcat:wsw3olpxzbeclenhex3f73qlw4

libalf: The Automata Learning Framework [chapter]

Benedikt Bollig, Joost-Pieter Katoen, Carsten Kern, Martin Leucker, Daniel Neider, David R. Piegdon
2010 Lecture Notes in Computer Science  
combining domain-specific features in a plug-and-play fashion.  ...  This paper presents libalf, a comprehensive, open-source library for learning formal languages. libalf covers various well-known learning techniques for finite automata (e.g.  ...  They are utilized to derive some kind of hypothesis which is able to classify new examples in conformance with the examples already seen.  ... 
doi:10.1007/978-3-642-14295-6_32 fatcat:2sngy2rnxjeixmh3y5rfr3tkji

Visa Processing Information System

M.Kamakshi Karthiga
2017 IOSR Journal of Computer Engineering  
It is a Client Server Project, Administrator can be able to create many no of users and the users are called as Customers. Administrator will describe the utilities accessed by an Customer  ...  This type of organizations is frequently sending their employees for their overseas clients. Our project is used to process their visa and store all the details regarding the passport holder.  ...  system.  Reduce the workload involved in processing  Update information system and provide easy access to corresponding information.  Fully automated data storing through onlineOnline Checking of  ... 
doi:10.9790/0661-1903023033 fatcat:qpjrqs4oxzhdtkeofoqh5yct24

OFCOD: On the Fly Clustering Based Outlier Detection Framework

Ahmed Elmogy, Hamada Rizk, Amany M. Sarhan
2020 Data  
In data mining, outlier detection is a major challenge as it has an important role in many applications such as medical data, image processing, fraud detection, intrusion detection, and so forth.  ...  In this paper, the first clustering based outlier detection framework, (On the Fly Clustering Based Outlier Detection (OFCOD)) is presented.  ...  Acknowledgments: The authors would like to thank the Deanship of Scientific Research in Prince Sattam Bin Abdelaziz University, KSA for his support during the stages of this research.  ... 
doi:10.3390/data6010001 fatcat:ausqg62qdvfm3myrk7qe5xhhkq
« Previous Showing results 1 — 15 out of 14,246 results