Sciweavers

1894 search results - page 317 / 379
» A TLA Proof System
Sort
View
127
Voted
CC
2010
Springer
172views System Software» more  CC 2010»
15 years 10 months ago
Verifying Local Transformations on Relaxed Memory Models
The problem of locally transforming or translating programs without altering their semantics is central to the construction of correct compilers. For concurrent shared-memory progr...
Sebastian Burckhardt, Madanlal Musuvathi, Vasu Sin...
110
Voted
ICRA
2009
IEEE
145views Robotics» more  ICRA 2009»
15 years 10 months ago
Expansion segmentation for visual collision detection and estimation
Abstract— Collision detection and estimation from a monocular visual sensor is an important enabling technology for safe navigation of small or micro air vehicles in near earth ï...
Jeffrey Byrne, Camillo J. Taylor
161
Voted
ICST
2009
IEEE
15 years 10 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
154
Voted
TPHOL
2009
IEEE
15 years 10 months ago
Formalising Observer Theory for Environment-Sensitive Bisimulation
Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Jeremy E. Dawson, Alwen Tiu
116
Voted
IFIP
2009
Springer
15 years 10 months ago
A Calculus of Trustworthy Ad Hoc Networks
We propose a process calculus for mobile ad hoc networks which embodies a behaviour-based multilevel decentralised trust model. Our trust model supports both direct trust, by monit...
Massimo Merro, Eleonora Sibilio