Filters








43 Hits in 5.5 sec

Replacing Testing with Formal Verification in Intel $^{\scriptsize\circledR}$ CoreTM i7 Processor Execution Engine Validation [chapter]

Roope Kaivola, Rajnish Ghughal, Naren Narasimhan, Amber Telfer, Jesse Whittemore, Sudhindra Pandav, Anna Slobodová, Christopher Taylor, Vladimir Frolov, Erik Reeber, Armaghan Naik
2009 Lecture Notes in Computer Science  
For the recent Intel Core TM i7 design we took a step further and used formal verification as the primary validation vehicle for the core execution cluster, the component responsible for the functional  ...  Formal verification of arithmetic datapaths has been part of the established methodology for most Intel processor designs over the last years, usually in the role of supplementing more traditional coverage  ...  In the rest of the paper, we will first look briefly at Intel IA-32 processor structure, the execution cluster, Intel Core i7 design, and a typical processor design and validation flow.  ... 
doi:10.1007/978-3-642-02658-4_32 fatcat:tdsbihbxbbcenbo5ynsakkriq4

Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks

Jeroen Van Cleemput, Bjorn De Sutter, Koen De Bosschere
2017 IEEE Transactions on Dependable and Secure Computing  
This paper presents a dynamic compiler approach based on offline profiles and JIT compiler strategies.  ...  A prototype implementation in the Jikes Research VM is evaluated on RSA encryption, HMAC key verification, and IDEA encryption.  ...  that can tune code for specific architectures, we performed experiments on two different generations of Intel processors: ® Core™ 2 Duo (CPU E8400) and Intel® Core™ i7 (CPU 870).  ... 
doi:10.1109/tdsc.2017.2729549 fatcat:schgtfygg5clrldl7riyksw4m4

Post-silicon validation opportunities, challenges and recent advances

Subhasish Mitra, Sanjit A. Seshia, Nicola Nicolici
2010 Proceedings of the 47th Design Automation Conference on - DAC '10  
As a result, post-silicon validation is an emerging research topic with several exciting opportunities for major innovations in electronic design automation.  ...  Post-silicon validation is used to detect and fix bugs in integrated circuits and systems after manufacture.  ...  Program (FCRP), an SRC entity, the National Science Foundation (NSF), and the National Science and Engineering Research Council (NSERC) of Canada.  ... 
doi:10.1145/1837274.1837280 dblp:conf/dac/MitraSN10 fatcat:hwycqj5eljfxbnszwn3zn5yjmy

Raziel: Private and Verifiable Smart Contracts on Blockchains [article]

David Cerezo Sánchez
2020 arXiv   pre-print
., Proof-Carrying Code certificates) to prove the validity of smart contracts to third parties before their execution without revealing anything else.  ...  It follows approximately the following formula on a modern laptop (Intel® Core™ i7-7500U 2.7Ghz): time(bytecode size bs) = 0.25 + bs 6000 secs • Certificate size overhead: 30% Figure 5.2: Secure  ...  formal verification over a MPC framework (i.e., Dafny over the SecreC language of Sharemind), but only to formally prevent and justify the leakage of secrets in secure multi-party computation. • Oyente  ... 
arXiv:1807.09484v2 fatcat:ksncs6sm4bclfkhw6vhmfeqbdu

Model Checking a Model Checker: A Code Contract Combined Approach [chapter]

Jun Sun, Yang Liu, Bin Cheng
2010 Lecture Notes in Computer Science  
In this work, we propose a code contract combined approach for checking model checkers and apply it to a home-grown model checker PAT.  ...  By linking the interface models with actual source codes and exhausting all execution sequences of interface models using PAT, we model check PAT using itself !  ...  ., predicate abstraction) in model checking the interface models.  ... 
doi:10.1007/978-3-642-16901-4_34 fatcat:ekgkwg6q2janfbevrg2a63l3yy

Verification-enabling interaction model for services in smart space: a TAIS case

Andrew Ponomarev, Vladimir Parfenov
2015 2015 17th Conference of Open Innovations Association (FRUCT)  
In this paper, an interaction model is proposed for Tourist assistant -TAIS, a smart space-based service-oriented mobile application that provides a tourist information about attractions around based on  ...  The proposed interaction model is backed by a two-layered ontology of tourism domain and a formal model that can be used to ensure stability of the overall application.  ...  ACKNOWLEDGMENT The presented results are a part of the research carried out within the project funded by grants #13-07-00271, #14-07-00345 of the Russian Foundation for Basic Research.  ... 
doi:10.1109/fruct.2015.7117988 dblp:conf/fruct/PonomarevP15 fatcat:rsdfqqpqsjhylo6edwj3mco2r4

Sechduler: A Security-Aware Kernel Scheduler

Saman Zonouz, Rui Han, Parisa Haghani
2013 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing  
In this paper, we present Sechduler, a formally verifiable security-aware operating system scheduler that dynamically makes sure that system computational resources are allocated to individual waiting  ...  tasks in an optimal order such that, if feasible, neither realtime nor security requirements of the system are violated.  ...  An Ubuntu 11.10 computer system with Intel ® Core™ i7 3.4 GHz Processor and 4 GB of memory was used for the experiments.  ... 
doi:10.1109/prdc.2013.45 dblp:conf/prdc/ZonouzHH13 fatcat:3zr2ndskmzbvths7schioduxkm

Sharing of Semantically Enhanced Information for the Adaptive Execution of Business Processes [article]

Pigi Kouki
2013 arXiv   pre-print
The SCS Engine supplies an interface where a client can execute the following operations: (i) write: which inserts in the space available information along with its respective meta-information, (ii) read  ...  In terms of this thesis the available types of meta-information are based on ontologies described in RDFS or WSML.  ...  The test system was a 64-bit Microsoft Windows 7 PC with Intel® Core™ i7 with a CPU at 1.60GHz and 4.00 GB RAM.  ... 
arXiv:1304.2326v1 fatcat:m3clnhfizrfvtgo76uzguqbn4u

D2.1: Supply Chain Analysis and Requirements

Julien Mascolo Jlenia Puma, Eleni-Maria Kalogeraki Sofoklis Efremidis, Danijela Boberic Krsticev, Nineta Polemi Alexandra Michota, Nikos Argyropoulos, Manolis Chatzimpyrros, Haralambos Mouratidis, Gregory Chrysos, Farhan Sahito, Pablo Giménez Salazar, Norma Zanetti, Sophia Karagiorgou
2021 Zenodo  
Their descriptions and the respective validated requirements are provided in this section. Two appendixes are included in the document.  ...  The first one gives information on a glossary that forms the basis of the concepts used in the project, while the second one gives details regarding the first workshop organized with the Advisory Boards  ...  (a) To access the PCS the haulier has a laptop Acer Aspire 3 A515-54-72TH with the following characteristics: Intel® Core™ i7-10510U processor, 8GB RAM and 256GB HDD storage.  ... 
doi:10.5281/zenodo.4884936 fatcat:67d3zmi7efhrzowbjleggzktgq

A risk-based approach applied to system engineering projects: A new learning based multi-criteria decision support tool based on an Ant Colony Algorithm

Majda Lachhab, Cédrik Béler, Thierry Coudert
2018 Engineering applications of artificial intelligence  
to system engineering projects: a new learning based multi-criteria decision support tool based on an ant colony algorithm.  ...  This is an author-deposited version published in: http://oatao.univ-toulouse.fr/ Eprints ID: 19945 To cite this version: Lachhab, Majda and Béler, Cédrick and Coudert, Thierry A risk-based approach applied  ...  This algorithm was developed by using the Ruby language and the experiments were done on a desktop computer (Intel ® Core™ i7 3,6 GHz processor).  ... 
doi:10.1016/j.engappai.2018.04.001 fatcat:iil5wft2precbavvpnriq3tlpu

Explainable Software Fault Localization Model: From Blackbox to Whitebox

Abdulaziz Alhumam
2022 Computers Materials & Continua  
That demonstrates a high level of proficiency in transfer learning, even with minimal training data.  ...  The proposed XFL ranks the software program statements based on the possible vulnerability score approximated from the training data.  ...  This activity is a component of his academic pursuits. Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/cmc.2022.029473 fatcat:evozi6zpanhqbbchfgy6pgiv5y

A Mobile-Based System for Detecting Plant Leaf Diseases Using Deep Learning

Ahmed Abdelmoamen Ahmed, Gopireddy Harshavardhan Reddy
2021 AgriEngineering  
This paper presents an ML-powered mobile-based system to automate the plant leaf disease diagnosis process.  ...  The developed system uses Convolutional Neural networks (CNN) as an underlying deep learning engine for classifying 38 disease categories.  ...  The model training was carried out using a server computer equipped with a 4.50 GHz Intel Core™ i7-16MB CPU processor, 16 GB of RAM, and RTX-3060 CUDA GPU 3584-cores with a base clock speed of 1320 MHz  ... 
doi:10.3390/agriengineering3030032 fatcat:6og5e2mxtveyrmzhhtvh2cs7vu

Context-Based Feature Technique for Sarcasm Identification in Benchmark Datasets using Deep learning and BERT Model

Christopher Ifeanyi Eke, Azah Anir Norman, Liyana Shuib
2021 IEEE Access  
The system uses an Intel Core™ i7-4770 CPU @ 3.400GHz with 16GB Random Access Memory (RAM) capacity.  ...  The system configuration is window ten (10) pro (64-bit operating system), running on Intel core i7 processor with 12 GB RAM.  ... 
doi:10.1109/access.2021.3068323 fatcat:qhm6odmxdjgzzmzcwopbx3gcqa

Semantic Interoperability in the IoT

Oscar Novo, Mario Di Francesco
2020 ACM Transactions on Internet of Things  
IoT is based on a similar assumption where the IoT technology is designed to become as invisible and non-invasive as possible to the physical environment.  ...  For this publication, the author carried out a gap analysis of the existing network transition technologies in IoT and performed a more thorough evaluation of the mechanism previously implemented in Publication  ...  This publication continues on the work started in Publication I.  ... 
doi:10.1145/3375838 fatcat:4w3ynmghjjc2ln3qlkl3p5nwrq

NOBLE – Flexible concept recognition for large-scale biomedical natural language processing

Eugene Tseytlin, Kevin Mitchell, Elizabeth Legowski, Julia Corrigan, Girish Chavan, Rebecca S. Jacobson
2016 BMC Bioinformatics  
Natural language processing (NLP) applications are increasingly important in biomedical data analysis, knowledge engineering, and decision support.  ...  NOBLE provides a term-to-concept matching system suitable for general concept recognition in biomedical NLP pipelines.  ...  We also thank Guergana Savova, Sean Finan, and the cTAKES team at Boston Children's Hospital for assistance in use of the cTAKES pipeline and dictionary annotators.  ... 
doi:10.1186/s12859-015-0871-y pmid:26763894 pmcid:PMC4712516 fatcat:kyhuk7x4ordsblw7imamiymbsi
« Previous Showing results 1 — 15 out of 43 results