-
4
-
-
49749112061
-
Scalable sequential equivalence checking across arbitrary design transformations
-
J. Baumgartner, H. Mony, V. Paruthi, R. Kanzelman, and G. Janssen. Scalable sequential equivalence checking across arbitrary design transformations. In ICCD'06, pages 259-266, 2006.
-
(2006)
ICCD'06
, pp. 259-266
-
-
Baumgartner, J.1
Mony, H.2
Paruthi, V.3
Kanzelman, R.4
Janssen, G.5
-
5
-
-
35048900689
-
Symbolic model checking: 1020 States and beyond
-
June
-
J. R. Burch, E. M. Clarke, K. L. McMillan, D. L. Dill, and L. J. Hwang. Symbolic model checking: 1020 states and beyond. Inf. Comput., 98:142-170, June 1992.
-
(1992)
Inf. Comput.
, vol.98
, pp. 142-170
-
-
Burch, J.R.1
Clarke, E.M.2
McMillan, K.L.3
Dill, D.L.4
Hwang, L.J.5
-
6
-
-
0003558118
-
-
Kluwer Academic Publishers, Norwell, MA, USA
-
D. D. Gajski, N. D. Dutt, A. C.-H. Wu, and S. Y.-L. Lin. High-level synthesis: Introduction to Chip and System Design. Kluwer Academic Publishers, Norwell, MA, USA, 1992.
-
(1992)
High-level Synthesis: Introduction to Chip and System Design
-
-
Gajski, D.D.1
Dutt, N.D.2
Wu, A.C.-H.3
Lin, S.Y.-L.4
-
7
-
-
0003620778
-
-
Addison Wesley
-
J. E. Hopcroft, R. Motwani, and J. D. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison Wesley, 2000.
-
(2000)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.E.1
Motwani, R.2
Ullman, J.D.3
-
8
-
-
77954013621
-
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
-
ACM
-
S. Kumar, B. Chandrasekaran, J. Turner, and G. Varghese. Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia. In ANCS '07, pages 155-164. ACM, 2007.
-
(2007)
ANCS '07
, pp. 155-164
-
-
Kumar, S.1
Chandrasekaran, B.2
Turner, J.3
Varghese, G.4
-
9
-
-
33745162025
-
Interpolation and SAT-based model checking
-
Computer Aided Verification, Springer Berlin / Heidelberg
-
K. McMillan. Interpolation and SAT-based model checking. In Computer Aided Verification, volume 2725 of Lecture Notes in Computer Science, pages 1-13. Springer Berlin / Heidelberg, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2725
, pp. 1-13
-
-
McMillan, K.1
-
10
-
-
70350060045
-
Speculative reduction-based scalable redundancy identification
-
H. Mony, J. Baumgartner, A. Mishchenko, and R. Brayton. Speculative reduction-based scalable redundancy identification. In DATE '09, pages 1674-1679, 2009.
-
(2009)
DATE '09
, pp. 1674-1679
-
-
Mony, H.1
Baumgartner, J.2
Mishchenko, A.3
Brayton, R.4
-
11
-
-
72149090631
-
Memory-e cient distribution of regular expressions for fast deep packet inspection
-
J. Rohrer, K. Atasu, J. van Lunteren, and C. Hagleitner. Memory-e cient distribution of regular expressions for fast deep packet inspection. In CODES+ISSS, pages 147-154, 2009.
-
(2009)
CODES+ISSS
, pp. 147-154
-
-
Rohrer, J.1
Atasu, K.2
Van Lunteren, J.3
Hagleitner, C.4
-
12
-
-
65249094689
-
Deating the big bang: Fast and scalable deep packet inspection with extended finite automata
-
ACM
-
R. Smith, C. Estan, S. Jha, and S. Kong. Deating the big bang: fast and scalable deep packet inspection with extended finite automata. In SIGCOMM '08, pages 207-218. ACM, 2008.
-
(2008)
SIGCOMM '08
, pp. 207-218
-
-
Smith, R.1
Estan, C.2
Jha, S.3
Kong, S.4
-
13
-
-
27544490145
-
A high throughput string matching architecture for intrusion detection and prevention
-
L. Tan and T. Sherwood. A high throughput string matching architecture for intrusion detection and prevention. In ISCA '05, pages 112-122, 2005.
-
(2005)
ISCA '05
, pp. 112-122
-
-
Tan, L.1
Sherwood, T.2
-
14
-
-
8344251916
-
Deterministic memory-efficient string matching algorithms for intrusion detection
-
N. Tuck, T. Sherwood, B. Calder, and G. Varghese. Deterministic memory-efficient string matching algorithms for intrusion detection. In IEEE Infocom, pages 2628-2639, 2004.
-
(2004)
IEEE Infocom
, pp. 2628-2639
-
-
Tuck, N.1
Sherwood, T.2
Calder, B.3
Varghese, G.4
-
15
-
-
38549173266
-
High-performance pattern-matching for intrusion detection
-
J. van Lunteren. High-performance pattern-matching for intrusion detection. In INFOCOM 2006, pages 1-13, 2006.
-
(2006)
INFOCOM 2006
, pp. 1-13
-
-
Van Lunteren, J.1
|