Sciweavers

2488 search results - page 190 / 498
» An improvement in formal verification
Sort
View
ESORICS
2009
Springer
16 years 1 months ago
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
Abstract. As the number and scope of government regulations and rules mandating trustworthy retention of data keep growing, businesses today are facing a higher degree of regulatio...
Tiancheng Li, Xiaonan Ma, Ninghui Li
AVBPA
2003
Springer
164views Biometrics» more  AVBPA 2003»
15 years 6 months ago
Personal Verification Using Palmprint and Hand Geometry Biometric
A new approach for the personal identification using hand images is presented. This paper attempts to improve the performance of palmprint-based verification system by integrating ...
Ajay Kumar, David C. M. Wong, Helen C. Shen, Anil ...
DSN
2007
IEEE
15 years 5 months ago
Automatic Verification and Discovery of Byzantine Consensus Protocols
Model-checking of asynchronous distributed protocols is challenging because of the large size of the state and solution spaces. This paper tackles this problem in the context of l...
Piotr Zielinski
CAV
2008
Springer
96views Hardware» more  CAV 2008»
15 years 3 months ago
Implied Set Closure and Its Application to Memory Consistency Verification
Hangal et. al. [3] have developed a procedure to check if an instance of the execution of a shared memory multiprocessor program, is consistent with the Total Store Order (TSO) mem...
Surender Baswana, Shashank K. Mehta, Vishal Powar
CP
2008
Springer
15 years 3 months ago
CPBPV: A Constraint-Programming Framework for Bounded Program Verification
Abstract. This paper studies how to verify the conformity of a program with its specification and proposes a novel constraint-programming framework for bounded program verification...
Hélène Collavizza, Michel Rueher, Pa...