Sciweavers

1763 search results - page 332 / 353
» A Formalization of Polytime Functions
Sort
View
ACL2
2006
ACM
15 years 3 months ago
A verifying core for a cryptographic language compiler
A verifying compiler is one that emits both object code and a proof of correspondence between object and source code.1 We report the use of ACL2 in building a verifying compiler f...
Lee Pike, Mark Shields, John Matthews
APLAS
2006
ACM
15 years 3 months ago
A Bytecode Logic for JML and Types
This document contains the Isabelle/HOL sources underlying our paper A bytecode logic for JML and types [2], updated to Isabelle 2008. We present a program logic for a subset of s...
Lennart Beringer, Martin Hofmann
ICCAD
2005
IEEE
132views Hardware» more  ICCAD 2005»
15 years 3 months ago
Battery optimization vs energy optimization: which to choose and when?
— Batteries are non-ideal energy sources – minimizing the energy consumption of a battery-powered system is not equivalent to maximizing its battery life. We propose an alterna...
Ravishankar Rao, Sarma B. K. Vrudhula
ICDCS
2005
IEEE
15 years 3 months ago
Controlling Gossip Protocol Infection Pattern Using Adaptive Fanout
We propose and evaluate a model for controlling infection patterns defined over rounds or real time in a gossipbased protocol using adaptive fanout. We model three versions of go...
Satish Verma, Wei Tsang Ooi
SASN
2005
ACM
15 years 3 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu